27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5557 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46783<br />

Description: Synopsis :\n\nThe remote mail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Exim, a message transfer agent. For your information, the observed<br />

version of Exim is %L.\n\nVersions of Exim earlier than 4.72 are potentially affected by<br />

multiple vulnerabilities :\n\n - An error when handling hardlinks within the mail directory<br />

during the email delivery process can be exploited to perform unauthorized actions.<br />

(CVE-2010-2023)\n\n - When MBX locking is enabled, a race condition exists which could<br />

allow an attacker to change permissions of other non-rot users' files, leading to<br />

denial-of-service conditions or potentially privilege escalation. (CVE-2010-2024)<br />

Solution: Upgrade to Exim 4.72 or later when it becomes available.<br />

CVE-2010-2024<br />

Mozilla Thunderbird Version Detection<br />

<strong>PVS</strong> ID: 5558 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

OpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5559 FAMILY: Web Servers RISK: HIGH NESSUS ID:46801<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL is %L.\n\nVersions of OpenSSL earlier than<br />

0.9.8o and 1.0.0a are potentially affected by multiple vulnerabilities :\n\n - CMS structures<br />

containing 'OriginatorInfo' are mishandled which can cause the application to write to<br />

invalid memory addresses or free up memory twice. Note that this only affects OpenSSL<br />

with CMS code present. (CVE-2010-0742)\n\n - When verification recovery fails for RSA<br />

keys, an uninitialized buffer with an undefined length is returned instead of an error code.<br />

Note that this only affects OpenSSL 1.0.0. (CVE-2010-1633)<br />

Solution: Upgrade to OpenSSL 0.9.8o, 1.0.0, or later.<br />

CVE-2010-1633<br />

MySQL Version Detection<br />

<strong>PVS</strong> ID: 5560 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1489

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!