27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

'calendarEdit.php' script before using it to generate dynamic HTML.\n\n - Content passed<br />

to 'sent' parameter of the 'error413.php' script is not sanitized before being returned to the<br />

user.\n\nSuccessful exploitation of these issues could lead to execution of arbitrary HTML<br />

and script code in a user's browser within the security context of the affected site.\n\nThe<br />

reported version of Kerio Mailserver is: \n %L<br />

Solution: Upgrade to versaion 6.6.2 or higher.<br />

CVE-2008-5769<br />

UW-IMAP < 2007e c-client Library Overflow<br />

<strong>PVS</strong> ID: 4798 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a flaw in the<br />

remote UW-IMAP server that allows a remote user to execute arbitrary code on the server.<br />

The flaw is in the way that UW-IMAP handles malformed data sent to the<br />

'rfc822_output_char' function of the 'c-client' library. An attacker exploiting this flaw<br />

would only need the ability to send malformed data to the server process. The observed<br />

banner (with version info) was: \n %L \n<br />

Solution: Upgrade to version 2007e or higher.<br />

CVE-2008-5514<br />

McAfee ePO Version Detection<br />

<strong>PVS</strong> ID: 4799 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running McAfee ePO version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

IceWarp Merak Mail Server < 9.4.0 IMG Tag XSS<br />

<strong>PVS</strong> ID: 4800 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35281<br />

Description: Synopsis : \n\nThe remote webmail server is affected by a cross-site scripting<br />

vulnerability.\n\nThe remote host is running IceWarp Merak Mail Server, a webmail server<br />

for Windows and Linux. According to its banner, the version of IceWarp installed on the<br />

remote host is older than 9.4.0. Such versions reportedly fail to sanitize input passed to<br />

'IMG' HTML tags in an e-mail message before displaying them. A remote attacker could<br />

leverage this issue to inject arbitrary HTML and script code into a user's browser to be<br />

executed within the security context of the affected application. The reported version of<br />

Merak is: \n %L<br />

Family Internet Services 1266

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!