27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

compartmental mismatches that can lead potentially exploitable crashes.<br />

(CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler that can allow<br />

same-origin policy bypass. (CVE-2013-0747)\n\n - An error related to the 'toString' method<br />

of XBL objects can lead to address information leakage. (CVE-2013-0748)\n\n - An<br />

unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769,<br />

CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string concatenation.<br />

(CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with SVG<br />

content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists<br />

related to 'XMLSerializer' and 'serializeToStream'. (CVE-2013-0753)\n\n - A use-after-free<br />

error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)\n\n - A<br />

use-after-free error exists related to the 'Vibrate' library and 'domDoc'.<br />

(CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript 'Proxy' objects.<br />

(CVE-2013-0756)\n\n - 'Chrome Object Wrappers' (COW) can be bypassed by changing<br />

object prototypes and can allow arbitrary code execution. (CVE-2013-0757)\n\n - An error<br />

related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)\n\n<br />

- An error exists related to the address bar that can allow URL spoofing attacks.<br />

(CVE-2013-0759)\n\n - An error exists related to SSL and threading that can result in<br />

potentially exploitable crashes. (CVE-2013-0764)\n\n - An error exists related to 'Canvas'<br />

and bad height or width values passed to it from HTML. (CVE-2013-0768)<br />

Solution: Upgrade to SeaMonkey 2.15 or later.<br />

CVE-2013-0770<br />

PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching MiTM Weakness<br />

<strong>PVS</strong> ID: 6671 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:63621<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a<br />

man-in-the-middle attack.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions 5.3.x earlier than 5.3.21 are affected by a weakness<br />

in the cURL extension that call allow SSL spoofing and man-in-the-middle<br />

attacks.\n\nWhen attempting to validate a certificate, the cURL library (libcurl) fails to<br />

verify that a server hostname matches a domain name in an X.509 certificate's 'Subject<br />

Common Name' (CN) or 'SubjectAltName'.\n\nNote that this plugin does not attempt to<br />

verify whether the PHP install has been built with the cURL extention but instead relies<br />

only on PHP's self-reported version number.<br />

Solution: Upgrade to PHP version 5.3.21 or later.<br />

CVE Not available<br />

PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness<br />

<strong>PVS</strong> ID: 6672 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:63622<br />

Family Internet Services 1835

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!