27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running the RPC status service.<br />

Solution: N/A<br />

CVE Not available<br />

Cyrus IMAP Server login Command Remote Overflow<br />

<strong>PVS</strong> ID: 1085 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:11196<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nAccording to its<br />

banner, the remote Cyrus IMAP server is vulnerable to a pre-login buffer overrun. An<br />

attacker without a valid login could exploit this, and would be able to execute arbitrary<br />

commands as the owner of the Cyrus process. This would allow full access to all users'<br />

mailboxes. More information : http://online.securityfocus.com/archive/1/301864<br />

Solution: If possible, upgrade to an unaffected version. However, at the time of writing no official fix<br />

was available. There is a source patch against 2.1.10 in the Bugtraq report.<br />

IMAP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1086 FAMILY: IMAP Servers RISK: INFO NESSUS ID:11414<br />

Description: An IMAP server is running on this port. According to the banner, it is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 1087 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10625<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote IMAP4 server which allows an authenticated user to obtain a<br />

remote shell.<br />

Solution: upgrade your imap server or use another one<br />

CVE-2000-0284<br />

UoW imapd (UW-IMAP) BODY Request Remote Overflow<br />

<strong>PVS</strong> ID: 1088 FAMILY: IMAP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10966<br />

Family Internet Services 277

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!