27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote client browser is vulnerable to a flaw which allows for the theft<br />

of authentication cookies.\n\nThe remote host is running a version of the Mozilla browser<br />

that could allow a remote attacker to steal cookie-based authentication information. A<br />

remote attacker could create a specially crafted URL link containing a NULL byte<br />

character string (%00) that would cause the victims cookie information to be sent to a<br />

specified hostname once the link is clicked.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE-2002-2013<br />

Netscape/Mozilla/Galeon Local File Enumeration<br />

<strong>PVS</strong> ID: 1311 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that could allow a<br />

remote attacker to detect the existence of files on the local file system of the web client<br />

accessing the attackers page. The vulnerability is caused by improper handling of<br />

embedded Cascading Style-Sheet (CSS) elements in the broswer.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE-2002-0594<br />

Netscape/Mozilla Malformed Email Newline POP3 Remote DoS<br />

<strong>PVS</strong> ID: 1312 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Mozilla browser that is vulnerable to a Denial of<br />

Service attack. Specifically, a malformed email message may prevent the client from<br />

accessing POP3 mailboxes.<br />

Solution: Upgrade to the latest version of Mozilla or Netscape<br />

CVE-2002-2338<br />

Netscape/Mozilla Navigator Plugin Path Disclosure<br />

<strong>PVS</strong> ID: 1313 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that is prone to a<br />

path-disclosure issue. Javascript may be used to communicate with the plugin. It is possible<br />

to access the filename of the plugin using JavaScript, and on some systems this also will<br />

expose the full path to the plugin. If the plugin is located in the home directory of the user,<br />

this also has the potential to disclose their username.<br />

Family Internet Services 336

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!