27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to PHP version 5.4.3 or later.<br />

CVE-2012-2336<br />

Mozilla SeaMonkey 2.x < 2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6496 FAMILY: Web Clients RISK: HIGH NESSUS ID:59411<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.10 are potentially affected by the following<br />

security issues :\n\n - An error exists in the ASN.1 decoder when handling zero length<br />

items that can lead to application crashes. (CVE-2012-0441)\n\n - Multiple memory<br />

corruption errors exist. (CVE-2012-1937, CVE-2012-1938)\n\n - Two heap-based buffer<br />

overflows and one heap-based use-after-free error exist and are potentially exploitable.<br />

(CVE-2012-1940, CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues<br />

exist related to the application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to SeaMonkey 2.10 or later.<br />

CVE-2012-1947<br />

Mozilla Firefox 12.x < 12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6497 FAMILY: Web Clients RISK: HIGH NESSUS ID:59407<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 12.x are potentially affected by the following security issues :\n\n -<br />

An error exists in the ASN.1 decoder when handling zero length items that can lead to<br />

application crashes. (CVE-2012-0441)\n\n - Multiple memory corruption errors exist.<br />

(CVE-2012-1937, CVE-2012-1038)\n\n - Two heap-based buffer overflows and one<br />

heap-based use-after-free error exist and are potentially exploitable. (CVE-2012-1940,<br />

CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues exist related to the<br />

application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to Firefox 13.0 or later.<br />

CVE-2012-1947<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1774

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!