27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

elies on called 'jsvc' contains an error in that it does not drop capabilities after starting and<br />

can allow access to sensitive files owned by the super user. Note that this vulnerability only<br />

affects Linux operating systems and only when the following are true : \n\n - jsvc is<br />

compiled with libpcap.\n\n - The '-user' parameter is used<br />

Solution: Upgrade to Apache Tomcat 7.0.20 or later.<br />

CVE-2011-2729<br />

Mozilla Firefox 5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6008 FAMILY: Web Clients RISK: HIGH NESSUS ID:55902<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 5 are potentially affected by the following security issues : \n\n - A<br />

dangling pointer vulnerability exists in an SVG text manipulation routine.<br />

(CVE-2011-0084)\n\n - Several memory safety bugs exist in the browser engine that may<br />

permit remote code execution. (CVE-2011-2985, CVE-2011-2989, CVE-2011-2991,<br />

CVE-2011-2992)\n\n - A cross-origin data theft vulnerability exists when using CANVAS<br />

and Windows D2D hardware acceleration. (CVE-2011-2986)\n\n - A heap overflow<br />

vulnerability exists in WebGL's ANGLE library. (CVE-2011-2987)\n\n - A buffer overflow<br />

vulnerability exists in WebGL when using an overly long shader program.<br />

(CVE-2011-2988)\n\n - Two errors exist related to Content <strong>Security</strong> Policy that can lead to<br />

information disclosure. (CVE-2011-2990)\n\n - An unspecified error exists that can allow<br />

unsigned JavaScript to call into a signed JAR and inherit the signed JAR's permissions and<br />

identity. (CVE-2011-2993)<br />

Solution: Upgrade to Firefox 6.0 or later.<br />

CVE-2011-2993<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.6 < 3.6.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6009 FAMILY: Web Clients RISK: HIGH NESSUS ID:55901<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6 earlier than 3.6.20 are potentially affected by the following<br />

security issues : \n\n - A dangling pointer vulnerability exists in an SVG text manipulation<br />

routine. (CVE-2011-0084)\n\n. -A DOM accounting error exists in the 'appendChild'<br />

JavaScript function that can allow an invalid pointer to be dereferenced.<br />

(CVE-2011-2378)\n\n - An error exists in 'ThinkPadSensor: : Startup' that can allow<br />

malicious DLLs to be loaded. (CVE-2011-2980)\n\n - An error exists in the event<br />

management code that can allow JavaScript to execute in the context of a different website<br />

and possibly in the chrome-privileged context. (CVE-2011-2981)\n\n - Various unspecified<br />

memory safety issues exist. (CVE-2011-2982)\n\n - A cross-domain information disclosure<br />

vulnerability exists if the configuration option 'RegExp.input' is set. (CVE-2011-2983)\n\n -<br />

Family Internet Services 1638

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!