27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4139 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the IBM 'Tivoli Provisioning Manager for OS Deployment' version<br />

%L\nThis version of the software is vulnerable to a flaw in the way that it handles<br />

malformed TFTP requests. An attacker exploiting this flaw can cause a crash that would<br />

affect all of the Tivoli services on the server. An attacker exploiting this flaw would need to<br />

be able to send malformed TFTP requests to the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3268<br />

Firefox < 2.0.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4140 FAMILY: Web Clients RISK: HIGH NESSUS ID:25735<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, one of which may lead to execution of arbitrary code on the affected host subject to<br />

the user's privileges.<br />

Solution: Upgrade to version 1.5.0.12 / 2.0.0.4 or higher.<br />

CVE-2007-3734<br />

Ipswitch IMail Server < 2006.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4141 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:25737<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running Ipswitch IMail, a commercial messaging and collaboration suite for<br />

Windows. According to its banner, the version of Ipswitch IMail installed on the remote<br />

host has several buffer overflows in its IMAP service component, one of which can be<br />

exploited to execute arbitrary code with SYSTEM privileges prior to authentication. In<br />

addition, there is also an denial of service issue that can cause the IM server to crash<br />

without authentication.<br />

Solution: Upgrade to version 2006.21 or higher.<br />

CVE-2007-3927<br />

Opera < 9.22 Torrent File Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4142 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is prone to a buffer overflow<br />

attack.\n\nThe version of Opera installed on the remote host reportedly contains a buffer<br />

overflow vulnerability that can be triggered by a malicious Torrent file. Successful<br />

exploitation requires that a user browse to a malicious URI and is enticed into opening a<br />

Family Internet Services 1075

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!