27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(CVE-2012-02817)\n\n - An unspecified use-after-free flaw exists in the counter layout<br />

which may allow for execution of arbitrary code. (CVE-2012-2818)\n\n - A flaw exists in<br />

the WebGL subsystem when the texSubImage2d implementation does not properly handle<br />

uploads to floating-point textures, which may allow a remote denial of service.<br />

(CVE-2012-2919)\n\n - An out-of-bounds read error occurs during the handling of SVG<br />

filters, which may allow a remote denial of service. (CVE-2012-2820)\n\n - A flaw exists<br />

in the autofill display. No further details have been provided. (CVE-2012-2821)\n\n - An<br />

out-of-bounds read error occurs during the handling of PDF files, which may allow<br />

multiple unspecified remote denial of service attacks. (CVE-2012-2822)\n\n - An<br />

user-after-free flaw exists during the handling of SVG resources, which may allow for<br />

execution of arbitrary code. (CVE-2012-2823, CVE-2012-2831)\n\n - An user-after-free<br />

flaw exists in SVG painting. No further details have been provided. (CVE-2012-2824)\n\n -<br />

An out-of-bounds read error occurs during texture conversion which may allow a remote<br />

denial of service. (CVE-2012-2826)\n\n - An use-after-free flaw in the Mac GUI. No<br />

further details have been provided. (CVE-2012-2827)\n\n - A flaw exists in improper<br />

sanitizing of user-supplied inputting resulting in multiple unspecified integer overflows<br />

with a specially crafted PDF file. (CVE-2012-2828)\n\n - An user-after-free flaw is<br />

triggered during handling of first letters. No further details have been provided.<br />

(CVE-2012-2829)\n\n - A flaw is triggered when an unspecified NULL pointer dereference<br />

occurs in array setting handling. (CVE-2012-2830)\n\n - A flaw is triggered when a NULL<br />

pointer dereference occurs in a PDF image codec. (CVE-2012-2832)\n\n - An overflow<br />

condition occurs when the PDF JS API fails to properly sanitize user-supplied input<br />

resulting in a buffer overflow. (CVE-2012-2833)\n\n - An overflow condition occurs in the<br />

Matroska container which fails to properly sanitize user-supplied input resulting in an<br />

integer overflow. (CVE-2012-2834)\n\n - A flaw exists in the way it loads<br />

dynamic-link-libraries (DLL). (CVE-2012-2764)\n\n - A flaw is triggered when an<br />

unspecified wild read occurs during the handling of XSL. (CVE-2012-2825)\n\n - This<br />

issue is only present on 64-bit Linux platforms. The libxml is prone to multiple unspecified<br />

overflow conditions. (CVE-2012-2807)<br />

Solution: Upgrade to Google Chrome 20.0.1132.43 or later.<br />

FW/Proxy detection<br />

CVE-2012-2807<br />

<strong>PVS</strong> ID: 6509 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Firewall or Proxy device<br />

Solution: N/A<br />

CVE Not available<br />

Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-009)<br />

<strong>PVS</strong> ID: 6510 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:59714<br />

Family Internet Services 1778

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!