27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

security-bypass vulnerability exists because it fails to properly enforce the cross-origin<br />

policy. Specifically, this issue occurs when invoking the 'GetProperty()' function through<br />

JSAPI. An attacker can exploit this issue to perform arbitrary code-execution.<br />

(CVE-2012-3991)\n\n - A cross-site scripting vulnerability exists because it fails to<br />

sufficiently sanitize user-supplied input. Specifically, this issue occurs when handling the<br />

'location' property through binary plugins. (CVE-2012-3994)\n\n - A security-bypass<br />

vulnerability exists because of an error in the Chrome Object Wrapper (COW) when<br />

handling the 'InstallTrigger' object. An attacker can exploit this issue to access certain<br />

privileged functions and properties. (CVE-2012-4184, CVE-2012-3993)\n\n - An arbitrary<br />

code-execution occurs when handling the 'location.hash' property and history navigation.<br />

(CVE-2012-3992)\n\n - An out-of-bounds read error affects the<br />

'IsCSSWordSpacingSpace()' function. (CVE-2012-3995)\n\n - A use-after-free error affects<br />

the 'nsHTMLCSSUtils::CreateCSSPropertyTxn()' function. (CVE-2012-4179)\n\n - A<br />

heap-based buffer-overflow vulnerability exists in the<br />

'nsHTMLEditor::IsPrevCharInNodeWhitespace()' function. (CVE-2012-4180)\n\n - A<br />

use-after-free error affects the 'nsSMILAnimationController::DoSample()' function.<br />

(CVE-2012-4181)\n\n - A use-after-free error affects the 'nsTextEditRules::WillInsert()'<br />

function. (CVE-2012-4182)\n\n - A use-after-free error affects the<br />

'DOMSVGTests::GetRequiredFeatures()' function. (CVE-2012-4183)\n\n - A<br />

buffer-overflow vulnerability exists in the 'nsCharTraits::length()' function.<br />

(CVE-2012-4185)\n\n - A heap-based buffer-overflow vulnerability exists in the<br />

'nsWaveReader::DecodeAudioData()" function. (CVE-2012-4186)\n\n - A<br />

memory-corruption vulnerability exists in the 'insPos' property. (CVE-2012-4187)\n\n - A<br />

heap-based buffer-overflow exists in the 'Convolve3x3()' function. (CVE-2012-4188)\n\n -<br />

A use-after-free error affects the 'nsIContent::GetNameSpaceID()' function.<br />

(CVE-2012-3990)\n\n - A cross domain information disclosure exists due to improper<br />

access to the 'location' object. (CVE-2012-4192)\n\n - A security-bypass vulnerability<br />

exists due to an error in security wrappers does not unwrap the 'defaultValue()' function<br />

properly. An attacker can exploit this issue to gain access to the 'location' object.<br />

(CVE-2012-4193)\nThese vulnerabilities allow attackers to execute arbitrary script or<br />

HTML code, steal cookie-based authentication credentials, conduct phishing attacks,<br />

execute arbitrary code in the context of the vulnerable application, crash affected<br />

applications, obtain potentially sensitive information, gain escalated privileges, bypass<br />

security restrictions, and perform unauthorized actions; other attacks may also be possible.<br />

Solution: Upgrade to Firefox 16.0 or later.<br />

CVE-2012-5354<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6603 FAMILY: Web Clients RISK: HIGH NESSUS ID:62583<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 16.x are potentially affected by the following security issues :\n\n -<br />

Multiple memory-corruption vulnerabilities in the browser engine that could lead to<br />

arbitrary code execution. (CVE-2012-3982, CVE-2012-3983, CVE-2012-4191)\n\n - A<br />

URI-spoofing vulnerability due to an error when handling the '' dropdown menu.<br />

This issue can be exploited to display arbitrary content while showing the URL of another<br />

Family Internet Services 1809

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!