27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firefox < 1.5.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3636 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Firefox. The installed version of Firefox contains multiple flaws that could allow<br />

an attacker to execute arbitrary code, disable the service, or gain access to confidential data.<br />

An attacker exploiting this flaw would need to be able to convince a user to browse to a<br />

malicious URI.<br />

Solution: Upgrade to version 1.5.0.4 or higher.<br />

CVE-2006-2781<br />

SeaMonkey < 1.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3637 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using SeaMonkey. The installed version of SeaMonkey contains various<br />

security issues that may allow an attacker to execute code or escalate privileges on the<br />

remote browser. An attacker exploiting these flaws would need to be able to convince a<br />

user to browse to a malicious URI.<br />

Solution: Upgrade to version 1.0.2 or higher.<br />

CVE-2006-2781<br />

Thunderbird < 1.5.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3638 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a vulnerable version of Mozilla Thunderbird mail client. This<br />

version of Thunderbird is vulnerable to multiple flaws that might allow an attacker to<br />

launch Denial of Service attacks, buffer overflows, information disclosure, privilege<br />

escalation, and other issues. An attacker exploiting these flaws would need to be able to<br />

convince a user to open or read a malicious email. Successful exploitation would, at the<br />

most, give the attacker the ability to execute arbitrary code with the permissions of the user<br />

running Thunderbird.<br />

Solution: Upgrade to version 1.5.0.4 or higher.<br />

CVE-2006-2781<br />

SquirrelMail < 1.4.8 Local File Inclusion<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3639 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 938

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!