27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 16.0.912.77 are potentially affected by<br />

multiple vulnerabilities :\n\n - Use-after-free errors exist related to DOM selections, DOM<br />

handling, and Safe Browsing functionality. (CVE-2011-3924, CVE-2011-3925,<br />

CVE-2011-3928)\n\n - A heap-based buffer overflow exists in the 'tree builder'.<br />

(CVE-2011-3926)\n\n - An error exists related to an uninitialized value in 'Skia'.<br />

(CVE-2011-3927)<br />

Solution: Upgrade to Google Chrome 16.0.912.77 or later.<br />

CVE-2011-3928<br />

Opera < 11.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6295 FAMILY: Web Clients RISK: HIGH NESSUS ID:57751<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.61 are potentially affected by multiple vulnerabilities :\n\n - It is possible to manipulate<br />

framed content in a way that allows cross-site scripting. (Issue 1007)\n\n - Script events can<br />

be used to reveal the presence of local files. (Issue 1008)<br />

Solution: Upgrade to Opera 11.61 or later.<br />

CVE Not available<br />

CentOS Version Detection<br />

<strong>PVS</strong> ID: 6296 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running CentOS version: %L.<br />

Solution: Ensure that host is up to date on security updates and in accordance to company policy.<br />

CVE Not available<br />

Android 2.3 < 2.3.6 Information Disclosure<br />

<strong>PVS</strong> ID: 6297 FAMILY: Mobile Devices<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nFor your information, the observed version of Android OS installed on the<br />

remote device is : \n %L \n\nVersions of Android OS earlier than 2.3.6 are potentially<br />

affected by an information disclosure vulnerability. The bluetooth stack used by Android<br />

2.3 allows a physically proximate attacker to obtain contact information from a target<br />

device via AT phonebook transfer.<br />

Family Internet Services 1718

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!