27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

cross-site scripting attacks. (CVE-2012-1965)\n\n - Cross-site scripting attacks are possible<br />

due to an error related to the 'data:' URL and context menus. (CVE-2012-1966)\n\n - An<br />

error exists related to the 'javascript:' URL that can allow scripts to run at elevated<br />

privileges outside the sandbox. (CVE-2012-1967)<br />

Solution: Upgrade to Firefox 14.0 or later.<br />

CVE-2012-1967<br />

Mozilla Thunderbird 13.x < 13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6520 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:60045<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 13.x are potentially affected by the following security issues<br />

:\n\n - Several memory safety issues exist, some of which could potentially allow arbitrary<br />

code execution. (CVE-2012-1948, CVE-2012-1949)\n\n - Several memory safety issues<br />

exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952,<br />

CVE-2012-1953, CVE-2012-1954)\n\n - An error related to JavaScript functions<br />

'history.forward' and 'history.back' can allow incorrect URLs to be displayed.<br />

(CVE-2012-1955)\n\n - Cross-site scripting attacks are possible due to an error related to<br />

the '' tag within an RSS '' element. (CVE-2012-1957)\n\n - A<br />

use-after-free error exists related to the method 'nsGlobalWindow::PageHidden'.<br />

(CVE-2012-1958)\n\n - An error exists that can allow 'same-compartment security<br />

wrappers' (SCSW) to be bypassed. (CVE-2012-1959)\n\n - An out-of-bounds read error<br />

exists related to the color management library (QCMS). (CVE-2012-1960)\n\n - The<br />

'X-Frames-Options' header is ignored if it is duplicated. (CVE-2012-1961)\n\n - A memory<br />

corruption error exists related to the method 'JSDependentString::undepend'.<br />

(CVE-2012-1962)\n\n - An error related to the 'Content <strong>Security</strong> Policy' (CSP)<br />

implementation can allow the disclosure of OAuth 2.0 access tokens and OpenID<br />

credentials. (CVE-2012-1963)\n\n - An error exists related to the 'javascript:' URL that can<br />

allow scripts to run at elevated privileges outside the sandbox. (CVE-2012-1967)<br />

Solution: Upgrade to Thunderbird 14.0 or later.<br />

CVE-2012-1967<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6521 FAMILY: Web Clients RISK: HIGH NESSUS ID:60046<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.11 are potentially affected by the following<br />

security issues :\n\n - Several memory safety issues exist, some of which could potentially<br />

allow arbitrary code execution. (CVE-2012-1948, CVE-2012-1949)\n\n - Several memory<br />

safety issues exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952,<br />

CVE-2012-1953, CVE-2012-1954)\n\n - An error related to JavaScript functions<br />

'history.forward' and 'history.back' can allow incorrect URLs to be displayed.<br />

Family Internet Services 1782

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!