27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 6679 FAMILY: Web Clients RISK: HIGH NESSUS ID:64287<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS < 6.1 are potentially affected by multiple<br />

vulnerabilities. Apple iOS 6.1 contains security fixes for the following products :\n\n - An<br />

error related to 'EUC-JP' encoding could allow cross-site scripting attacks.<br />

(CVE-2011-3058)\n\n - An out-of-bounds read error exists related to 802.11i information<br />

handling that could allow remote attackers to disable Wi-Fi. (CVE-2012-2619)\n\n - An<br />

error exists related to certificate-based 'Apple ID' authentication that could allow improper<br />

trust extension. (CVE-2013-0963)\n\n - An error exists related to the 'copyin' and 'copyout'<br />

functions that could allow a user-mode process to access the first page of kernel memory.<br />

(CVE-2013-0964)\n\n - An error exists related to Mobile Safari preferences that could<br />

improperly allow JavaScript to be enabled after a user has disabled it.<br />

(CVE-2013-0974)\n\n - Many errors exist related to the bundled 'WebKit' components.<br />

(CVE-2012-2824, CVE-2012-2857, CVE-2012-2889, CVE-2012-3606, CVE-2012-3607,<br />

CVE-2012-3621, CVE-2012-3632, CVE-2012-3687, CVE-2012-3701, CVE-2013-0948,<br />

CVE-2013-0949, CVE-2013-0950, CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,<br />

CVE-2013-0954, CVE-2013-0955, CVE-2013-0956, CVE-2013-0958, CVE-2013-0959,<br />

CVE-2013-0962, CVE-2013-0968)\n\n - Two intermediate certificates, improperly issued<br />

by TURKTRUST certificate authority, are incorrectly trusted.<br />

Solution: Upgrade to iOS 6.1 or later.<br />

CVE-2013-0974<br />

Opera < 12.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6680 FAMILY: Web Clients RISK: HIGH NESSUS ID:64363<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.13 are potentially affected by the following vulnerabilities :\n\n - An error exists related<br />

to DOM manipulation that could lead to application crashes or arbitrary code execution.<br />

(1042)\n\n - An error exists related to SVG 'clipPaths' that could lead to memory corruption<br />

or arbitrary code execution. (1043)\n\n - The application could fail to make the proper<br />

'pre-flight' Cross-Origin Resource Sharing (CORS) requests. In some situations this error<br />

could aid an attacker in cross-site request forgery (XSRF) attacks. (1045)\n\n - An<br />

unspecified, low severity issue exists that has an unspecified impact.<br />

Solution: Upgrade to Opera 12.13 or later.<br />

CVE-2013-1639<br />

Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6681 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1838

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!