27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2012-0449)\n\n - The HTML5 frame navigation policy can be violated by allowing<br />

an attacker to replace a sub-frame in another domain's document. (CVE-2012-0445)\n\n -<br />

Scripts in frames are able to bypass security restrictions in XPConnect. This bypass can<br />

allow malicious web sites to carry out cross-site scripting attacks. (CVE-2012-0446)\n\n -<br />

An information disclosure issue exists when uninitialized memory is used as padding when<br />

encoding icon images. (CVE-2012-0447)\n\n - If a user chooses to export their Firefox<br />

Sync key the 'Firefox Recover Key.html' file is saved with incorrect permissions, making<br />

the file contents potentially readable by other users. Note that this issue only affects Firefox<br />

on Linux and Mac OS X systems. (CVE-2012-0450)<br />

Solution: Upgrade to Firefox 10.0 or later.<br />

CVE-2012-0450<br />

Mozilla Firefox 3.6.x < 3.6.26 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6307 FAMILY: Web Clients RISK: HIGH NESSUS ID:57774<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.26 are potentially affected by the following<br />

security issues : \n\n - A use-after-free error exists related to removed nsDOMAttribute<br />

child nodes. (CVE-2011-3659)\n\n - The IPv6 literal syntax in web addresses is not being<br />

properly enforced. (CVE-2011-3670)\n\n - Various memory safety issues exist.<br />

(CVE-2012-0442)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

CVE-2012-0449)<br />

Solution: Upgrade to Firefox 3.6.26 or later.<br />

CVE-2012-0449<br />

Mozilla Thunderbird 9.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6308 FAMILY: Web Clients RISK: HIGH NESSUS ID:57775<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Thunderbird is :<br />

\n %L \n\nVersions of Thunderbird 9.0 are potentially affected by the following security<br />

issues : \n\n - A use-after-free error exists related to removed nsDOMAttribute child nodes.<br />

(CVE-2011-3659)\n\n - Various memory safety issues exist. (CVE-2012-0442,<br />

CVE-2012-0443)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

CVE-2012-0449)\n\n - The HTML5 frame navigation policy can be violated by allowing<br />

an attacker to replace a sub-frame in another domain's document. (CVE-2012-0445)\n\n -<br />

Scripts in frames are able to bypass security restrictions in XPConnect. This bypass can<br />

allow malicious web sites to carry out cross-site scripting attacks. (CVE-2012-0446)\n\n -<br />

An information disclosure issue exists when uninitialized memory is used as padding when<br />

Family Internet Services 1722

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!