27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3936 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3937 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3938 FAMILY: POP Server RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

MySpaceIM Chat Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3939 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1020

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!