27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 6.0 are potentially affected by the following security issues : \n\n -<br />

If an attacker could trick a user into holding down the 'Enter' key, via a malicious game, for<br />

example, a malicious application or extension could be downloaded and executed.<br />

(CVE-2011-2372)\n\n - Unspecified errors exist that can be exploited to corrupt memory.<br />

No additional information is available at this time. (CVE-2011-2995, CVE-2011-2997)\n\n<br />

- A weakness exists when handling the 'Location' header. This can lead to response splitting<br />

attacks when visiting a vulnerable web server. The same fix has been applied to the headers<br />

'Content-Length' and 'Content-Disposition'. (CVE-2011-3000)\n\n - An error exists within<br />

WebGL's ANGLE library. It does not properly check for return values from the<br />

'GrowAtomTable()' function. This vulnerability can be exploited to cause a buffer overflow<br />

by sending a series of requests. Additionally, an unspecified error exists within WebGL that<br />

can be exploited to corrupt memory. (CVE-2011-3002, CVE-2011-3003)\n\n - There is an<br />

error within the JSSubScriptLoader that incorrectly unwraps 'XPCNativeWrappers'. By<br />

tricking a user into installing a malicious plug-in, an attacker could exploit this issue to<br />

execute arbitrary code. (CVE-2011-3004)\n\n - A use-after-free error exists when parsing<br />

OGG headers. (CVE-2011-3005)\n\n - There is an unspecified error within the YARR<br />

regular expression library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to Firefox 7.0 or later.<br />

CVE-2011-3232<br />

Mozilla Thunderbird 6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6029 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:56336<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nThunderbird 6.0 is potentially affected by multiple vulnerabilities :\n\n - If an<br />

attacker could trick a user into holding down the 'Enter' key, via a malicious game, for<br />

example, a malicious application or extension could be downloaded or executed.<br />

(CVE-2011-2372, CVE-2011-3001)\n\n - Unspecified errors exist that can be exploited to<br />

corrupt memory. No additional information is avialable at this time. (CVE-2011-2995,<br />

CVE-2011-2997)\n\n - A weakness exists when handling the 'Location' header. This can<br />

lead to response splitting attacks when visiting a vulnerable web server. The same fix has<br />

been applied to the headers 'Content-Length' and 'Content-Disposition.<br />

(CVE-2011-3000)\n\n - A use-after-free error exists when parsing OGG headers.<br />

(CVE-2011-3005)\n\n - There is an unspecified error within the YARR regular expression<br />

library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to Thunderbird 7.0 or later.<br />

CVE-2011-3232<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6030 FAMILY: Web Clients RISK: HIGH NESSUS ID:56337<br />

Family Internet Services 1646

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!