27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

processes may then attempt to use this data and cause application crashes. These<br />

application crashes are potentially exploitable.<br />

Solution: Upgrade to Thunderbird 10.0.1 or later.<br />

CVE-2012-0452<br />

Mozilla Thunderbird 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6327 FAMILY: Web Clients RISK: HIGH NESSUS ID:58075<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is potentially affected by an<br />

integer overflow vulnerability.\n\nFor your information, the observed version of<br />

Thunderbird is : \n %L \n\nVersions of Thunderbird 10.x earlier than 10.0.2 are potentially<br />

affected by an integer overflow error in 'libpng', a library used by this application. When<br />

decompressing certain PNG image files, this error can allow a heap-based buffer overflow<br />

which can crash the application or potentially allow code execution.<br />

Solution: Upgrade to Thunderbird 10.0.2 or later.<br />

CVE-2011-3026<br />

Mozilla SeaMonkey 2.x < 2.7.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6328 FAMILY: Web Clients RISK: HIGH NESSUS ID:57921<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of SeaMonkey is :<br />

\n %L \n\nVersions of SeaMonkey 2.x earlier than 2.7.1 are potentially affected by a<br />

memory corruption vulnerability. A use-after-free error exists in the method<br />

'nsXBLDocumentInfo::ReadPrototypeBindings' and XBL bindings are not properly<br />

removed from a hash table in the event of failure. Clean up processes may then attempt to<br />

use this data and cause application crashes. These application crashes are potentially<br />

exploitable.<br />

Solution: Upgrade to SeaMonkey 2.7.1 or later.<br />

CVE-2012-0452<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6329 FAMILY: Web Clients RISK: HIGH NESSUS ID:58009<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by an integer<br />

overflow vulnerability.\n\nFor your information, the observed version of SeaMonkey is : \n<br />

%L \n\nVersions of SeaMonkey 2.x earlier than 2.7.2 are potentially affected by an integer<br />

overflow vulnerability in 'libpng', a library used by this application. When decompressing<br />

certain PNG image files, this error can allow a heap-based buffer overflow which can crash<br />

the application or potentially allow code execution.<br />

Family Internet Services 1729

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!