CERTA-2005-AVI-362
Vulnerability from certfr_avis - Published: 2005-09-23 - Updated: 2005-09-23
Le navigateur Secure Web Browser d'OpenVMS peut être compromis par le biais de nombreuses vulnérabilités pouvant déboucher sur des actions malveillantes diverses.
Description
Le navigateur Secure Web Browser d'OpenVMS est construit à partir du navigateur Mozilla. Les récentes failles concernant ce dernier touchent aussi Secure Web Browser.
L'exploitation de ces failles peut conduire à des actions malveillantes diverses telles que le contournement de la politique de sécurité, les attaques de type Cross Site Scritping, le détournement de consultation web, l'exécution de code arbitraire, etc..
Solution
- Bulletin de sécurité de l'éditeur : HP SSRT5999
http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBOV01229
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenVMS 7.x.",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "OpenVMS 6.x ;",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe navigateur Secure Web Browser d\u0027OpenVMS est construit \u00e0 partir du\nnavigateur Mozilla. Les r\u00e9centes failles concernant ce dernier touchent\naussi Secure Web Browser.\n\nL\u0027exploitation de ces failles peut conduire \u00e0 des actions malveillantes\ndiverses telles que le contournement de la politique de s\u00e9curit\u00e9, les\nattaques de type Cross Site Scritping, le d\u00e9tournement de consultation\nweb, l\u0027ex\u00e9cution de code arbitraire, etc..\n\n## Solution\n\n- Bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur : HP SSRT5999\n\n http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBOV01229\n",
"cves": [],
"initial_release_date": "2005-09-23T00:00:00",
"last_revision_date": "2005-09-23T00:00:00",
"links": [],
"reference": "CERTA-2005-AVI-362",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-09-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Le navigateur Secure Web Browser d\u0027OpenVMS peut \u00eatre compromis par le\nbiais de nombreuses vuln\u00e9rabilit\u00e9s pouvant d\u00e9boucher sur des actions\nmalveillantes diverses.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans Secure Web Browser d\u0027OpenVMS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de HP",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…