27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running an Interbase database server. The version is: '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Interbase Database Remote Stack Overflow<br />

<strong>PVS</strong> ID: 4514 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running an Interbase database server. The version is: '%L'. This version has been reported<br />

vulnerable to a remote buffer overflow. An attacker, exploiting this flaw, would only need<br />

to be able to connect to the database service port (3050/tcp by default). Successful<br />

exploitation would result in the attacker executing arbitrary code.<br />

Solution: The issue has been fixed in version 8.1.0.2578 which is available from the vendor website.<br />

CVE-2008-2559<br />

Trillian < 3.1.10.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4515 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:32400<br />

Description: Synopsis :\n\nThe remote host contains an instant messaging application that is affected by<br />

several vulnerabilities.\n\nThe version of Trillian installed on the remote host reportedly<br />

contains several vulnerabilities :\n\n - A stack buffer overflow in 'aim.dll' triggered when<br />

parsing messages with overly long attribute values within the 'FONT' tag.\n - A memory<br />

corruption issue within XML parsing in 'talk.dll' triggered when processing malformed<br />

attributes within an 'IMG' tag. \n - A stack buffer overflow in the header-parsing code for<br />

the MSN protocol when processing the 'X-MMS-IM-FORMAT' header.\n\nSuccessful<br />

exploitation of each issue can result in code execution subject to the privileges of the<br />

current user.<br />

Solution: Upgrade to Trillian 3.1.10.0 or later as it is reported to resolve these issues.<br />

CVE-2008-2409<br />

MDAP Service Detection<br />

<strong>PVS</strong> ID: 4516 FAMILY: Generic RISK: INFO NESSUS ID:32399<br />

Description: Synopsis :\n\nA network service is listening on the remote host.\n\nThe remote service<br />

supports the Multi Directory Access Protocol (MDAP), which is used to multicast<br />

commands to certain types of network devices, such as Thompson ADSL modems.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!