27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459,<br />

CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - Ah HTTP<br />

Header security bypass vulnerability that can be leveraged by attackers to bypass certain<br />

security restrictions and conduct cross-site scripting attacks. (CVE-2012-0451)\n\n - A<br />

security bypass vulnerability that can be exploited by an attacker if the victim can be<br />

tricked into setting a new home page by dragging a specially crafted link to the 'home'<br />

button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)\n\n -<br />

'window.fullScreen' is writeable by untrusted content, allowing attackers to perform UI<br />

spoofing attacks. (CVE-2012-0460)<br />

Solution: Upgrade to Firefox 10.0.3 ESR or later.<br />

CVE-2012-0464<br />

Mozilla Firefox 3.6.x < 3.6.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6351 FAMILY: Web Clients RISK: HIGH NESSUS ID:58354<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.28 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0457, CVE-2012-0461, CVE-2012-0463,<br />

CVE-2012-0464)\n\n - A security bypass vulnerability that can be exploited by an attacker<br />

if the victim can be tricked into setting a new home page by dragging a specially crafted<br />

link to the 'home' button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)<br />

Solution: Upgrade to Firefox 3.6.28 or later.<br />

CVE-2012-0464<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 10.x < 10.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6352 FAMILY: Web Clients RISK: HIGH NESSUS ID:58355<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 10.x earlier than 10.0.3 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459,<br />

CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - Ah HTTP<br />

Family Internet Services 1737

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!