27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to the latest version of Mozilla or Netscape<br />

CVE Not available<br />

Mozilla JavaScript URL Host Spoofing Arbitrary Cookie Disclosure<br />

<strong>PVS</strong> ID: 1314 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client allows malicious websites to steal 'cookie' data.\n\nThe<br />

remote host is running a version of the Mozilla browser that may allow script code to<br />

access cookie data associated with arbitrary domains. It has been reported possible to create<br />

a javascript URL which appears to start with a valid domain. Malicious script code may<br />

specify an arbitrary domain, and will be able to access cookie data associated with that<br />

domain.<br />

Solution: Upgrade to Mozilla 1.1 Beta or higher<br />

CVE-2002-2314<br />

Mozilla FTP View URL Title Tag XSS<br />

<strong>PVS</strong> ID: 1315 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is running a version of the Mozilla browser that contains a cross-site scripting<br />

vulnerability. When viewing the contents of a FTP site as web content from a ftp:// URL,<br />

the directory name is included in the HTML representation. It is not adequately sanetized<br />

before this occurs. An attacker may embed javascript as this value between opening and<br />

closing "" tags in a FTP URLL<br />

Solution: Upgrade to the latest version of Mozilla or disable Javascript.<br />

CVE-2002-2359<br />

Mozilla OnUnload Referer Information Leakage Race Condition Information Disclosure<br />

<strong>PVS</strong> ID: 1316 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that has a problem<br />

in its implementation of the JavaScript "onUnload" event handler that has the potential to<br />

leak sensitive information to websites. When other pages are launched using the event<br />

handler, the vulnerable client encapsulates the address of the next page that is visited in the<br />

HTTP referer field. The correct behavior is to include the address of the previously visited<br />

page in the HTTP referer field. Using this handler, a webpage can cause the browser to link<br />

information about the next page that was visited.<br />

Family Internet Services 337

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!