27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

code on the remote host. The version of Firefox is vulnerable to multiple denial of service<br />

attacks, overflows, information disclosure, privilege escalation, and other issues. An<br />

attacker exploiting these flaws would need to be able to convince a Firefox user to browse<br />

to a malicious URI.<br />

Solution: Upgrade to version 1.5.0.2, 1.0.8 or higher.<br />

CVE-2006-1730<br />

Mozilla Thunderbird < 1.5.0.2 or 1.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3513 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a vulnerable version of Mozilla Thunderbird mail client. This<br />

version of Thunderbird is vulnerable to multiple denial of service attacks, overflows,<br />

information disclosure, privilege escalation, and other issues. An attacker exploiting these<br />

flaws would need to be able to convince a user to open or read a malicious email.<br />

Successful exploitation would give the attacker the ability to execute arbitrary code with<br />

the permissions of the user running Thunderbird.<br />

Solution: Install version 1.5.0.2, 1.0.8 or higher.<br />

CVE-2006-1730<br />

Mozilla Browser < 1.7.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3514 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla. The installed version of Mozilla contains various security<br />

issues, several of which are critical as they can be easily exploited to execute arbitrary shell<br />

code on the remote host. The version of Mozilla is vulnerable to multiple denial of service<br />

attacks, overflows, information disclosure, privilege escalation, and other issues. An<br />

attacker exploiting these flaws would need to be able to convince a Mozilla user to browse<br />

to a malicious URI.<br />

Solution: Upgrade to version 1.7.13 or higher.<br />

CVE-2006-1730<br />

Opera < 8.54 signedness StyleSheet Overflow<br />

<strong>PVS</strong> ID: 3515 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21221<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to a buffer<br />

overflow vulnerability.\n\nThe remote host is using Opera. The version of Opera installed<br />

on the remote host contains a buffer overflow that can be triggered by a long value within a<br />

stylesheet attribute. Successful exploitation can lead to a browser crash and possibly allow<br />

for the execution of arbitrary code subject to the privileges of the user running Opera.<br />

Family Internet Services 906

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!