27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 1773 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla or Mozilla Thunderbird that is vulnerable to a<br />

heap overflow vulnerability. A heap overflow has been reported for the Mozilla POP3 mail<br />

handler routines. An attacker controlled POP3 server may be able to execute arbitrary code<br />

on the client machine.<br />

Solution: Upgrade to Mozilla 1.7.1 / Thunderbird 0.7.1 or higher.<br />

CVE-2004-0757<br />

Opera < 7.54.0 Remote Location Object XSS<br />

<strong>PVS</strong> ID: 1774 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using Opera, which is affected by a remote location object cross-domain<br />

scripting issue. An attacker may gain access to directory contents, files and email messages<br />

that are read using Opera's email utilities.<br />

Solution: Install Opera 7.54.0 or higher.<br />

CVE-2004-2570<br />

Mozilla XML User Interface Language Browser Interface Spoofing<br />

<strong>PVS</strong> ID: 1775 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla that is vulnerable to multiple user interface<br />

spoofing issues that may allow a rogue web server to mimic the interface of a trusted web<br />

site and prompt users to submit sensitive or private information.<br />

Solution: Upgrade to the newest version.<br />

CVE-2004-0763<br />

Pavuk < 0.928r3 Digest Authentication Remote Overflow<br />

<strong>PVS</strong> ID: 1776 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of Pavuk, a web spider, that is vulnerable to an<br />

authentication buffer overflow. An attacker can construct a malicious website that is<br />

designed to trigger the vulnerability and run arbitrary code on the client machine.<br />

Solution: Upgrade to 0.928r3 or higher.<br />

CVE-2004-1437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 451

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!