27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to Flash Player 10.3.183.50 / 11.5.502.146 or later, or Google Chrome<br />

PepperFlash 11.5.31.137 or later.<br />

Mozilla Firefox 17.x <<br />

CVE-2013-0630<br />

<strong>PVS</strong> ID: 6668 FAMILY: Web Clients RISK: HIGH NESSUS ID:63551<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 17.x are potentially affected by the following security issues :\n\n -<br />

Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist.<br />

(CVE-2012-5829, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763,<br />

CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)\n\n - Two intermediate certificates<br />

were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A<br />

use-after-free error exists related to displaying HTML tables with many columns and<br />

column groups. (CVE-2013-0744)\n\n - An error exists related to the<br />

'AutoWrapperChanger' class that does not properly manage objects during garbage<br />

collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and<br />

compartmental mismatches that can lead potentially exploitable crashes.<br />

(CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler that can allow<br />

same-origin policy bypass. (CVE-2013-0747)\n\n - An error related to the 'toString' method<br />

of XBL objects can lead to address information leakage. (CVE-2013-0748)\n\n - An<br />

unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769,<br />

CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string concatenation.<br />

(CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with SVG<br />

content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists<br />

related to 'XMLSerializer' and 'serializeToStream'. (CVE-2013-0753)\n\n - A use-after-free<br />

error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)\n\n - A<br />

use-after-free error exists related to the 'Vibrate' library and 'domDoc'.<br />

(CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript 'Proxy' objects.<br />

(CVE-2013-0756)\n\n - 'Chrome Object Wrappers' (COW) can be bypassed by changing<br />

object prototypes and can allow arbitrary code execution. (CVE-2013-0757)\n\n - An error<br />

related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)\n\n<br />

- An error exists related to the address bar that can allow URL spoofing attacks.<br />

(CVE-2013-0759)\n\n - An error exists related to SSL and threading that can result in<br />

potentially exploitable crashes. (CVE-2013-0764)\n\n - An error exists related to 'Canvas'<br />

and bad height or width values passed to it from HTML. (CVE-2013-0768)<br />

Solution: Upgrade to Firefox 18.0 or later.<br />

CVE-2013-0771<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6669 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:63553<br />

Family Internet Services 1833

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!