27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

Mac OS X : Safari < 6.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6582 FAMILY: Web Clients RISK: HIGH NESSUS ID:62216<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

vulnerabilities.\n\nThe remote Mac OS X host has Safari installed. For your information,<br />

the observed version of Safari is: \n %L \n\nVersions of Safari earlier than 6.0.1 are<br />

reportedly affected by several issues :\n\n - A logic error in Safari's handling of the<br />

Quarantine attribute caused the safe mode not to be triggered on Quarantined files, which<br />

could lead to the disclosure of local file contents. (CVE-2012-3713)\n\n - A rare condition<br />

in the handling of Form Autofill could lead to the disclosure of information from the<br />

Address Book 'Me' card that was not included in the Autofill popover.<br />

(CVE-2012-3714)\n\n - A logic issue in the handling of HTTPS URLs in the address bar<br />

when pasting text could result in the request being sent over HTTP. (CVE-2012-3715)\n\n -<br />

Numerous issues exist in WebKit. (CVE-2011-3105, CVE-2012-2817, CVE-2012-2818,<br />

CVE-2012-2829, CVE-2012-2831, CVE-2012-2842, CVE-2012-2843, CVE-2012-3598,<br />

CVE-2012-3601, CVE-2012-3602, CVE-2012-3606, CVE-2012-3607, CVE-2012-3612,<br />

CVE-2012-3613, CVE-2012-3614, CVE-2012-3616, CVE-2012-3617, CVE-2012-3621,<br />

CVE-2012-3622,CVE-2012-3623, CVE-2012-3624, CVE-2012-3632, CVE-2012-3643,<br />

CVE-2012-3647, CVE-2012-3648, CVE-2012-3649, CVE-2012-3651,<br />

CVE-2012-3652,CVE-2012-3654, CVE-2012-3657, CVE-2012-3658,CVE-2012-3659,<br />

CVE-2012-3660, CVE-2012-3671,CVE-2012-3672, CVE-2012-3673,<br />

CVE-2012-3675,CVE-2012-3676, CVE-2012-3677, CVE-2012-3684,CVE-2012-3685,<br />

CVE-2012-3687, CVE-2012-3688,CVE-2012-3692, CVE-2012-3699,<br />

CVE-2012-3700,CVE-2012-3701, CVE-2012-3702, CVE-2012-3703,CVE-2012-3704,<br />

CVE-2012-3705, CVE-2012-3706,CVE-2012-3707, CVE-2012-3708,<br />

CVE-2012-3709,CVE-2012-3710, CVE-2012-3711, CVE-2012-3712)<br />

Solution: Upgrade to Safari 6.0.1 or later.<br />

CVE-2012-3710<br />

Mac OS X 10.7 < 10.7.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6583 FAMILY: Generic RISK: HIGH NESSUS ID:61413<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.7 that is older than version 10.7.5. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- Apache\n\n - BIND\n\n - CoreText\n\n - Data <strong>Security</strong>\n\n - ImageIO\n\n - Installer\n\n -<br />

International Components for Unicode\n\n - Kernel\n\n - Mail\n\n - PHP\n\n - Profile<br />

Manager\n\n - QuickLook\n\n - QuickTime\n\n - Ruby\n\n - USB\nIAVA Reference :<br />

2012-A-0017\nIAVA Reference : 2012-A-0085\nIAVB Reference : 2012-B-0006\nSTIG<br />

Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.5 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1801

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!