27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell. By supplying an overly long tag the the BODY command, an attacker may gain a<br />

shell on this host.<br />

Solution: Upgrade to imap-2001a<br />

CVE-2002-0379<br />

Atrium MERCUR Mailserver Local Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 1089 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10382<br />

Description: Synopsis :\n\nThe remote system is vulnerable to an information disclosure flaw\n\nThe<br />

remote imap server is Mercur Mailserver 3.20. There is a flaw in this server (present up to<br />

version 3.20.02) which allows any authenticated user to read any file on the system. This<br />

includes other users mailboxes, or any system file. Warning : this flaw has not been<br />

actually checked but was deduced from the server banner<br />

Solution: There was no solution ready when this vulnerability was written; Please contact the vendor<br />

for updates that address this vulnerability.<br />

CVE-2000-0318<br />

Ipswitch IMail 5.0 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 1090 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10123<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nA buffer overflow in<br />

the remote IMAP server allows an intruder to execute arbitrary code on this host.<br />

Solution: Upgrade your IMAP server to the newest version.<br />

CVE-1999-1557<br />

Yak! FTP Server Default Credentials<br />

<strong>PVS</strong> ID: 1091 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote FTP Server is running with known default credentials\n\nYak<br />

uses the FTP protocol to transfer files. Yak UserID and/or password may be a static value.<br />

Versions prior to 2.1.0 have known default credentials. An attacker can use this flaw to<br />

send arbitrary data to client machines.<br />

Solution: Change the password for the default 'Yak' account.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 278

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!