27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to IBM SolidDB 6.5 SP2 or later.<br />

CVE-2010-2771<br />

Ipswitch IMail Server < 11.02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5600 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:47743<br />

Description: Synopsis :\n\nThe remote mail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Ipswitch IMail server. For your information, the observed version of<br />

Ipswitch IMail is %L.\n\nVersions of IMail earlier than 11.02 are potentially affected by<br />

multiple vulnerabilities :\n\n - By sending a specially crafted message to imailsrv.exe with<br />

multiple 'Reply-To' headers set, it may be possible for a remote unauthenticated attacker to<br />

execute arbitrary code on the remote system. (ZDI-10-126)\n\n - By sending a specially<br />

crafted message containing '?Q' operator, it may be possible for a remote authenticated<br />

attacker to execute arbitrary code on the remote system with SYSTEM privileges.<br />

(ZDI-10-127)\n\n - By sending a specially crafted message with an overly long '-NOTIFY'<br />

argument, it may be possible for a remote unauthenticated attacker to execute arbitrary<br />

code on the remote system. (ZDI-10-128)<br />

Solution: Upgrade to Ipswitch IMail Server version 11.02 or later.<br />

CVE Not available<br />

BIND 9.7.1 < 9.7.1 P2 'RRSIG' Record Type Remote DoS<br />

<strong>PVS</strong> ID: 5601 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47760<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote host is running BIND, an open source name server. For your<br />

information, the observed version of BIND is %L.\n\nVersions of BIND 9.7.1 earlier than<br />

9.7.1 P2 are potentially affected by a remote denial of service vulnerability when handling<br />

specially crafted queries for 'RRSIG' records.<br />

Solution: Upgrade to BIND 9.7.1 P2 or later.<br />

CVE-2010-0213<br />

Client .dat Download Detection<br />

<strong>PVS</strong> ID: 5602 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following '.dat' file: \n %L<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Client .dat Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1504

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!