27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Flash Player 10.3.183.10 or later.<br />

CVE-2011-2444<br />

phpMyAdmin 3.4.x < 3.4.5 Cross-site Scripting (PMASA-2011-14)<br />

<strong>PVS</strong> ID: 6026 FAMILY: CGI RISK: LOW NESSUS ID:56379<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by<br />

multiple cross-site scripting vulnerabilities.\n\nFor your information, the observed version<br />

of phpMyAdmin is : \n %L \n\nVersions of phpMyAdmin 3.4.x earlier than 3.4.5 are<br />

potentially affected by multiple cross-site scripting vulnerabilities : \n - The data used in the<br />

row content display after inline editing is not properly sanitized before it is passed back to<br />

the browser.\n - The data passed in as table, column, and index names is not properly<br />

sanitized before it is passed back to the browser.\nA remote attacker may use these issues<br />

to cause arbitrary code to be executed in a user's browser, to steal authentication cookies<br />

and the like.<br />

Solution: Apply the vendor patches or upgrade to phpMyAdmin 3.4.5 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.6 < 3.6.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6027 FAMILY: Web Clients RISK: HIGH NESSUS ID:56334<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6 earlier than 3.6.23 are potentially affected by the following<br />

security issues : \n - An integer underflow exists when handling a large JavaScript 'RegExp'<br />

expression that can allow a potentially exploitable crash. (Issue 684815)\n - If an attacker<br />

could trick a user into holding down the 'Enter' key, via a malicious game for example, a<br />

malicious application or extension could be downloaded and executed. (CVE-2011-2372)\n<br />

- Unspecified error exist that can be exploited to corrupt memory. No additional<br />

information is available at this time. (CVE-2011-2995, CVE-2011-2996)\n - There is an<br />

error in the implementation of the 'window.location' JavaScript object when creating named<br />

frames. This can be exploited to bypass the same-origin policy and potentially conduct<br />

cross-site scripting attacks. (CVE-2011-2999)\n - A weakness exists when handling the<br />

'Location' header. This can lead to response splitting attacks when visiting a vulnerable web<br />

server. The same fix has been applied to the headers 'Content-Length' and<br />

'Content-Disposition'. (CVE-2011-3000)<br />

Solution: Upgrade to Firefox 3.6.23 or later.<br />

CVE-2011-3000<br />

Mozilla Firefox 6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6028 FAMILY: Web Clients RISK: HIGH NESSUS ID:56335<br />

Family Internet Services 1645

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!