27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2008-4070<br />

MailMarshal < 6.4 Spam Quarantine Management XSS<br />

<strong>PVS</strong> ID: 4697 FAMILY: SMTP Servers RISK: LOW NESSUS ID:34336<br />

Description: Synopsis :\n\nThe remote host has an application that is affected by a cross-site scripting<br />

vulnerability.\n\nThe remote host is running MailMarshal SMTP, a mail server for<br />

Windows version '%L'. The Spam Quarantine Management web component included with<br />

the version of MailMarshal SMTP installed on the remote host is affected by a persistent<br />

cross-site scripting vulnerability in its 'delegated spam management' feature. By exploiting<br />

this issue, it may be possible for an internal user to install a malicious program on another<br />

internal user's (victim) computer, steal session cookies or launch similar attacks. Successful<br />

exploitation would require a victim to accept an email invitation for delegated spam<br />

management from an attacker.<br />

Solution: Upgrade to version 6.4 or higher.<br />

CVE-2008-2831<br />

lighttpd < 1.4.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4698 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34332<br />

Description: Synopsis :\n\nThe remote web server may be affected by several<br />

issues.\n\nAccording to its banner, the version of lighttpd installed on the<br />

remote host is older than 1.4.20. Such versions may be affected by<br />

several issues, including :\n\n - SSL connections could be shut down by a<br />

remote attacker.\n - URL rewrite and redirect patterns can be<br />

circumvented by encoding.\n - mod_userdir does not sanitize URLs,<br />

which could lead to an information disclosure on case insensitive file<br />

systems e.g. http://example.com/~user/file.PHP would get the source<br />

code of file.php, instead of running the script.\n - The server leaks<br />

memory when it processes duplicate headers. This could lead to a denial<br />

of service by resource exhaustion.<br />

Solution: Upgrade to version 1.4.20 or higher.<br />

CVE-2008-4298<br />

Serv-U < 7.3.0.1 Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4699 FAMILY: FTP Servers RISK: HIGH NESSUS ID:34398<br />

Description: Synopsis :\n\nThe remote FTP server is affected by several vulnerabilities.\n\nThe remote<br />

host is running Serv-U File Server, an FTP server for Windows. The reported version<br />

number is: '%L'\n\nThe installed version of Serv-U is earlier than 7.3.0.1 and thus is<br />

reportedly affected by the following issues :\n - An authenticated remote attacker can cause<br />

the service to consume all CPU time on the remote host by specifying a Windows port (eg,<br />

Family Internet Services 1234

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!