27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

'XMLHttpRequest' objects inherit incorrect principals when created in sandboxes that could<br />

allow cross-site request forgery attacks (XSRF). (CVE-2012-4205)\n\n - An error exists<br />

related to the application installer and DLL loading. (CVE-2012-4206)\n\n -<br />

'XrayWrappers' can expose DOM properties that are not meant to be accessible outside of<br />

the chrome compartment. (CVE-2012-4208)\n\n - Errors exist related to 'evalInSandbox',<br />

'HZ-GB-2312' charset, frames and the 'location' object, the 'Style Inspector', 'Developer<br />

Toolbar' and 'cross-origin wrappers' that could allow cross-site scripting (XSS) attacks.<br />

(CVE-2012-4201, CVE-2012-4207, CVE-2012-4209, CVE-2012-4210, CVE-2012-5837,<br />

CVE-2012-5841)\n\n - Various use-after-free, out-of-bounds read and buffer overflow<br />

errors exist that could potentially lead to arbitrary code execution. (CVE-2012-4212,<br />

CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-4217,<br />

CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833, CVE-2012-5835,<br />

CVE-2012-5838, CVE-2012-5839, CVE-2012-5840)<br />

Solution: Upgrade to Firefox 17.0 or later.<br />

CVE-2012-5843<br />

Mozilla SeaMonkey 2.x <<br />

<strong>PVS</strong> ID: 6626 FAMILY: Web Clients RISK: HIGH NESSUS ID:63001<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is: \n %L<br />

\n\nVersions of SeaMonkey 2.13.x are potentially affected by the following security issues<br />

:\n\n - Several memory safety bugs exist in the browser engine used in Mozilla-based<br />

products that could be exploited to execute arbitrary code. (CVE-2012-5842,<br />

CVE-2012-5843)\n\n - An error exists in the method 'image::RasterImage::DrawFrameTo'<br />

related to GIF images that could allow a heap-based buffer overflow leading to arbitrary<br />

code execution. (CVE-2012-4202)\n\n - An error exists related to SVG text and CSS<br />

properties that could lead to application crashes. (CVE-2012-5836)\n\n - The JavaScript<br />

function 'str_unescape' could allow arbitrary code execution. (CVE-2012-4204)\n\n -<br />

'XMLHttpRequest' objects inherit incorrect principals when created in sandboxes that could<br />

allow cross-site request forgery attacks (XSRF). (CVE-2012-4205)\n\n - 'XrayWrappers'<br />

can expose DOM properties that are not meant to be accessible outside of the chrome<br />

compartment. (CVE-2012-4208)\n\n - Errors exist related to 'evalInSandbox',<br />

'HZ-GB-2312' charset, frames and the 'location' object, and 'cross-origin wrappers' that can<br />

allow cross-site scripting (XSS) attacks. (CVE-2012-4201, CVE-2012-4207,<br />

CVE-2012-4209, CVE-2012-5841)\n\n - Various use-after-free, out-of-bounds read and<br />

buffer overflow errors exist that could potentially lead to arbitrary code execution.<br />

(CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,<br />

CVE-2012-4217, CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,<br />

CVE-2012-5835, CVE-2012-5838, CVE-2012-5839, CVE-2012-5840)<br />

Solution: Upgrade to SeaMonkey 2.14 or later.<br />

CVE-2012-5843<br />

Mozilla Thunderbird 16.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1819

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!