27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is a Cisco router that is advertising itself (via HSRP) as the current active<br />

router.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco HSRP 'Standby' Router Detection<br />

<strong>PVS</strong> ID: 4265 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Cisco router that is advertising itself (via HSRP) as the current standby<br />

router.<br />

Solution: N/A<br />

CVE Not available<br />

IBM Server RAID Manager Detection<br />

<strong>PVS</strong> ID: 4266 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running IBM Server RAID management software. This software allows<br />

administrators to centrally manage the RAID disks being utilized by the IBM server.<br />

Solution: N/A<br />

CVE Not available<br />

BEA WebLogic Cluster Server Detection<br />

<strong>PVS</strong> ID: 4267 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running BEA WebLogic software. Further, the server is configured as<br />

part of an Enterprise cluster of servers.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch IMail Client < 2006.23 Multipart MIME Email Overflow<br />

<strong>PVS</strong> ID: 4268 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:27590<br />

Description: Synopsis :\n\nThe remote Windows host contains a program that is prone to a buffer<br />

overflow attack.\n\nIMail Client, a tool for administering Ipswitch IMail Server, is installed<br />

on the remote Windows host. The version of IMail Client on the remote host contains a<br />

boundary error that can be triggered by a long 'boundary' parameter in when processing<br />

emails with multipart MIME data. If an attacker can trick the Ipswitch Mail Server<br />

administrator to open a specially-crafted email using the affected application, he can<br />

leverage this issue to execute arbitrary code subject to the user's privileges.<br />

Family Internet Services 1110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!