27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.4.0 are potentially affected by multiple<br />

vulnerabilities : \n\n - If an attacker could trick a user into holding down the 'Enter' key, via<br />

a malicious game, for example, a malicious application or extension could be downloaded<br />

and executed. (CVE-2011-2372, CVE-2011-3001)\n\n - Unspecified errors exist that can be<br />

exploited to corrupt memory. No additional information is available at this time.<br />

(CVE-2011-2995, CVE-2011-2997)\n\n - A weakness exists when handling the 'Location'<br />

header. This can be lead to response splitting attacks when visiting a vulnerable web server.<br />

The same fix has been applied to the headers 'Content-Length' and 'Content-Disposition'.<br />

(CVE-2011-3000)\n\n - An error exists with WebGL's ANGLE library. It does not properly<br />

check for return values from the 'GrowAtomTable()' function. This vulnerability can be<br />

exploited to cause a buffer overflow by sending a series of requests. Additionally, an<br />

unspecified error exists within WebGL that can be exploited to corrupt memory.<br />

(CVE-2011-3002, CVE-2011-3003)\n\n - There is an error within the JSSubScriptLoader<br />

that incorrectly unwraps 'XPCNativeWrappers'. By tricking a user into installing a<br />

malicious plug-in, an attacker could exploit this issue to execute arbitrary code.<br />

(CVE-2011-3004)\n\n - A use-after-free error exists when parsing OGG headers.<br />

(CVE-2011-3005)\n\n - There is an unspecified error within the YARR regular expression<br />

library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to SeaMonkey 2.4.0 or later.<br />

CVE-2011-3232<br />

Symantec IM Manager < 8.4.18 Multiple Vulnerabilities (SYM11-012)<br />

<strong>PVS</strong> ID: 6031 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56378<br />

Description: Synopsis : \n\nThe remote host contains a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Symantec IM Manager, an application for<br />

managing instant messaging traffic. For your information, the observed version of<br />

Symantec IM Manager is : \n %L \n\nVersions of Symantec IM Manager earlier than build<br />

8.4.18 are potentially affected by multiple vulnerabilities : \n\n - An unspecified cross-site<br />

scripting vulnerability. (CVE-2011-0552)\n\n - An unspecified SQL injection vulnerability.<br />

(CVE-2011-0553)\n\n - An unspecified code injection vulnerability. (CVE-2011-0554)<br />

Solution: Upgrade to Symantec IM Manager build 8.4.18 or later.<br />

CVE-2011-0554<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 14.0.835.202 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6032 FAMILY: Web Clients RISK: HIGH NESSUS ID:56391<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is : \n %L<br />

.\n\nVersions of Google Chrome earlier than 14.0.835.202 are affected by multiple<br />

vulnerabilities : \n\n - A use-after-free issue exists in text line box handling. (Issue<br />

Family Internet Services 1647

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!