27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mozilla SeaMonkey 2.x < 2.3.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6012 FAMILY: Web Clients RISK: HIGH NESSUS ID:55885<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.3.0 are potentially affected by multiple<br />

vulnerabilities : \n\n - An error in SVG text manipulation code createes a dangling pointer<br />

vulnerability. (CVE-2011-0084)\n\n - Multiple unspecified memory safety issues exist.<br />

(CVE-2011-2985)\n\n - An errir in the D2D hardware acceleration code can allow image<br />

data from one domain to be read by another domain. (CVE-2011-2986)\n\n - An error in<br />

the ANGLE library used by the WebGL implementation can allow heap overflows,<br />

possibly leading to code execution. (CVE-2011-2987)\n\n - An error in the shader program<br />

handling code can allow a large shader program to overflow a buffer and crash.<br />

(CVE-2011-2988)\n\n - An unspecified error exists related to WebGL.<br />

(CVE-2011-2989)\n\n - Two errors exist related to Content <strong>Security</strong> Policy and can lead to<br />

information disclosure. (CVE-2011-2990)\n\n - An unspecified error exists that can allow<br />

JavaScript crashes. (CVE-2011-2991)\n\n - An unspecified error exists that can allow the<br />

Ogg reader to crash. (CVE-2011-2992)\n\n - An unspecified error exists that can allow<br />

unsigned JavaScript to call into a signed JAR and inherit the signed JAR's permissions and<br />

identity. (CVE-2011-2993)<br />

Solution: Upgrade to SeaMonkey 2.3.0 or later.<br />

DHCP Client Detection<br />

CVE-2011-2993<br />

<strong>PVS</strong> ID: 6013 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A DHCP client is running on this host.<br />

Solution: N/A<br />

realtimeonly<br />

mDNS Client Queries<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6014 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a name query for the following resource name.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

PHP 5.3 < 5.3.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1640

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!