27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 9.0.0 or higher.<br />

CVE-2007-5046<br />

Firefox < 2.0.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4218 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is vulnerable to multiple flaws. It is alleged that an attacker exploiting<br />

the browser would be able to inject and run arbitrary code.<br />

Solution: Upgrade to version 2.0.0.7 or higher.<br />

CVE-2007-4841<br />

Bugzilla < 3.0.2 / 3.1.2 WebService/User.pm Authentication Bypass<br />

<strong>PVS</strong> ID: 4219 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Bugzilla, a bug-tracking software with a web<br />

interface. The version of Bugzilla on the remote host suffers from a flaw when parsing<br />

input to the 'createemailregexp' parameter of the 'offer_account_by_email()' function in the<br />

'WebService/User.pm' file. An attacker exploiting this flaw would need to know that the<br />

SOAP::Lite Perl module was installed. Successful exploitation would result in the attacker<br />

being able to create arbitrary Bugzilla user accounts.<br />

Solution: Upgrade to version 3.0.2, 3.1.2 or higher.<br />

CVE-2007-5038<br />

Mercury IMAP Server <<br />

<strong>PVS</strong> ID: 4220 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running the Mercury Mail Transport System, a free<br />

suite of server products for Windows and NetWare associated with Pegasus Mail. The<br />

remote installation of Mercury Mail includes an IMAP server that is affected by a buffer<br />

overflow vulnerability. Using a specially-crafted SEARCH command, an authenticated<br />

remote attacker can leverage this issue to crash the remote application and even execute<br />

arbitrary code, subject to the privileges under which the application runs.<br />

Solution: Upgrade to a version of higher than 4.52.<br />

CVE-2007-5018<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1097

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!