27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to a man-in-the-middle attack.\n\nThe remote<br />

mail server is running a version of Sendmail earlier than 8.14.4. Such versions are<br />

potentially affected by a flaw that my allow an attacker to spoof SSL certificates by using a<br />

NULL character in certain certificate fields. For your information, the observed version of<br />

Sendmail is: \n %L \nIAVA Reference : 2010-A-0002\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sendmail 8.14.4 or later.<br />

CVE-2009-4565<br />

Dada Mail < 4.0.2 List Membership Requirement Bypass<br />

<strong>PVS</strong> ID: 5294 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is affected by a security<br />

bypass vulnerability.\n\nThe remote web server is hosting Dada Mail, a web-based mailing<br />

list application. The installed version is earlier than 4.0.2. Such versions, when using the<br />

'Dada Bridge' plugin, are potentially affected by a security bypass vulnerability because the<br />

application does not verify that the sender of an email is a member of a list. An attacker<br />

could exploit this flaw to spam the email list. For your information, the observed version of<br />

Dada Mail is: \n %L<br />

Solution: Upgrade to Dada Mail 4.0.2 or later.<br />

CVE Not available<br />

Novell iManager < 2.7 SP3 eDirectory Plugin Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5295 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is affected by a buffer overflow<br />

vulnerability.\n\nNovell iManager is installed on the remote host. The version of iManager<br />

is earlier than 2.7 SP3 and is therefore potentially affected by a buffer overflow<br />

vulnerability in the eDirectory plugin. A remote attacker, exploiting this flaw, could<br />

potentially execute arbitrary code. For your information, the observed version of Novell<br />

iManager is: \n %L<br />

Solution: Upgrade to Novell iManager 2.7 SP3 (iManager 2.7.3).<br />

CVE-2009-4486<br />

Liferay Portal 'p_p_id' Parameter HTML Injection<br />

<strong>PVS</strong> ID: 5296 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

HTML-injection attack.\n\nThe remote web server is running Liferay Portal, a Java-based<br />

web portal. The installed version is earlier than 5.3.0. Such versions are potentially affected<br />

by an HTML injection vulnerability because the application fails to properly sanitize<br />

Family Internet Services 1415

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!