27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

flaw would need to be able to entice an iTunes user into opening a malformed file.<br />

Successful exploitation would result in the attacker executing arbitrary code on the remote<br />

system.<br />

Solution: Upgrade to version 7.4.0 or higher.<br />

CVE-2007-3752<br />

Gallery < 2.2.3 Information Disclosure<br />

<strong>PVS</strong> ID: 4205 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running Gallery, a web-based photo album application written in PHP. The<br />

version of Gallery installed on the remote host is lower than 2.2.3. The vendor has reported<br />

multiple security flaws in this version. It is alleged that a remote attacker can use these<br />

flaws to replace and/or modify program files.<br />

Solution: Upgrade to version 2.2.3 or higher.<br />

CVE-2007-4650<br />

Lighttpd < 1.4.18 mod_fastcgi HTTP Request Header Overflow<br />

<strong>PVS</strong> ID: 4206 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Lighttpd, a small web server. This version of Lighttpd is vulnerable to a buffer<br />

overflow via the 'mod_fastcgi' module. An attacker exploiting this flaw would only need<br />

the ability to send large, malformed requests to the 'mod_fastcgi' module. Successful<br />

exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to 1.4.18 or higher.<br />

CVE-2007-4727<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Hexamail < 3.0.1.004 POP3 Service USER Command Overflow<br />

<strong>PVS</strong> ID: 4207 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Hexamail, an SMTP server, version %L\nThis version of Hexamail is vulnerable to<br />

a buffer overflow in its POP3 service when passed a large string to the 'USER' directive.<br />

An attacker exploiting this flaw would only need to be able to connect to the POP3 port<br />

(default TCP/110) on the remote server. Successful exploitation would result in the attacker<br />

executing arbitrary code.<br />

Solution: Upgrade to version 3.0.1.004 or higher.<br />

Family Internet Services 1093

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!