27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

style elements in TeXML files. (CVE-2012-3752)\n\n - A buffer overflow exists in the<br />

handling of MIME types. (CVE-2012-3753)\n\n - A use-after-free issue exists in the<br />

QuickTime ActiveX control's handling of the 'Clear()' method. (CVE-2012-3754)\n\n - A<br />

buffer overflow exists in the handling of Targa image files. (CVE-2012-3755)\n\n - A<br />

buffer overflow exists in the handling of 'rnet' boxes in MP4 files.<br />

(CVE-2012-3756)\nSuccessful exploitation of these issues could result in program<br />

termination or arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to QuickTime 7.7.3 or later.<br />

CVE-2012-3758<br />

Opera < 12.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6621 FAMILY: Web Clients RISK: HIGH NESSUS ID:62984<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.11 are potentially affected by the following vulnerabilities :\n\n - A heap-based buffer<br />

overflow error exists related to handling HTTP responses that can lead to application<br />

crashes or arbitrary code execution. (1036)\n\n - An issue exists related to the application's<br />

error handling that can allow a malicious website to determine the existence of and path to<br />

local files. (1037)<br />

Solution: Upgrade to Opera 12.11 or later.<br />

CVE Not available<br />

Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6622 FAMILY: Web Clients RISK: HIGH NESSUS ID:62802<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

vulnerabilities.\n\nThe remote Mac OS X host has Safari installed. For your information,<br />

the observed version of Safari is: \n %L \n\nVersions of Safari earlier than 6.0.2 are<br />

reportedly affected by several issues :\n\n - A time-of-check-to-time-of-use issue in the<br />

handling of JavaScript array in WebKit could lead to arbitrary, remote code execution.<br />

(CVE-2012-3748)\n\n - A use-after-free issue in the handling of SVG images in WebKit<br />

code could lead to arbitrary, remote code execution. (CVE-2012-5112)<br />

Solution: Upgrade to Safari 6.0.2 or later.<br />

CVE-2012-5112<br />

Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service<br />

<strong>PVS</strong> ID: 6623 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62985<br />

Family Internet Services 1817

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!