27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2002-1565<br />

Curl < 7.4.1 Long Error Message Buffer Overflow<br />

<strong>PVS</strong> ID: 1745 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of curl (or libcurl) which is vulnerable to a remote buffer<br />

overflow. To exploit it, an attacker would have to set up a rogue web server which would<br />

reply with maliciously-formed error messages. It was determined the remote host is using :<br />

\n%L<br />

Solution: Upgrade to curl 7.4.1 or higher.<br />

CVE-2000-0973<br />

Mozilla < 0.9 Predictable Temporary File Name File Deletion<br />

<strong>PVS</strong> ID: 1746 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that uses predictable<br />

temporary file names. A local attacker may use this flaw to delete arbitrary files on this<br />

host. It was determined the remote host is using : \n%L<br />

Solution: Upgrade to Mozilla 0.9 or higher.<br />

CVE Not available<br />

Mozilla < 0.9.7 Null Byte Cookie Disclosure<br />

<strong>PVS</strong> ID: 1747 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that may allow an attacker<br />

to steal the cookies of the users because of the way Mozilla handles null characters in its<br />

URLs. It was determined the remote host is running : \n%L<br />

Solution: Upgrade to Mozilla 0.9.7 or higher.<br />

CVE-2002-2013<br />

Mozilla < 1.0rc2 Local File Detection<br />

<strong>PVS</strong> ID: 1748 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that may allow a rogue web<br />

server to determine the existence of files on the side of the client.<br />

Solution: Upgrade to Mozilla 1.0rc2 or higher.<br />

CVE-2002-0594<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 444

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!