27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4232 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4233 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4234 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4235 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Family Internet Services 1101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!