27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is a 7T Interactive Graphical SCADA System(IGSS) used to control and<br />

monitor programmable logic controllers(PLC) in industrial processes. There was an attempt<br />

to connect to the server listening on IP address: %L.<br />

Solution: Restrict access to the server to authorized personnel only. As well ensure that the product is<br />

up to date on all of its security patches.<br />

CVE Not available<br />

Mozilla Firefox 10.x < 10.0.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6324 FAMILY: Web Clients RISK: HIGH NESSUS ID:57919<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of Firefox is : \n<br />

%L \n\nVersions of Firefox 10.x earlier than 10.0.1 are potentially affected by a memory<br />

corruption vulnerability. A use-after-free error exists in the method<br />

'nxXBLDocumentInfo::ReadPrototypeBindings' and XBL bindings are not properly<br />

removed from a hash table in the event of failure. Clean up processes may then attempt to<br />

use this data and cause application crashes. These application crashes are potentially<br />

exploitable.<br />

Solution: Upgrade to Firefox 10.0.1 or later.<br />

CVE-2012-0452<br />

Mozilla Firefox 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6325 FAMILY: Web Clients RISK: HIGH NESSUS ID:58005<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by an integer<br />

overflow vulnerability.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 10.x earlier than 10.0.2 are potentially affected by an integer<br />

overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this<br />

application. When decompressing certain PNG image files, this error can allow a<br />

heap-based buffer overflow which can crash the application or potentially allow code<br />

execution.<br />

Solution: Upgrade to Firefox 10.0.2 or later.<br />

CVE-2011-3026<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 10.x < 10.0.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6326 FAMILY: Web Clients RISK: HIGH NESSUS ID:57920<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of Thunderbird is :<br />

\n %L \n\nVersions of Thunderbird 10.x earlier than 10.0.1 are potentially affected by a<br />

use-after-free error in the method 'nsXBLDocumentInfo::ReadPrototypeBindings' and XBL<br />

bindings are not properly removed from a hash table in the event of failure. Clean up<br />

Family Internet Services 1728

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!