27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Netscape Messaging Server IMAP LIST Command Remote Overflow<br />

<strong>PVS</strong> ID: 1092 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10580<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere may be a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell.<br />

Solution: Upgrade to the latest version.<br />

CVE-2000-0961<br />

UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 1093 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10374<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell.<br />

Solution: Upgrade imap-2000 or higher.<br />

CVE-2000-0284<br />

MDaemon IMAP Service CREATE Command Mailbox Name Handling Overflow<br />

<strong>PVS</strong> ID: 1094 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:11577<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nIt is possible to crash<br />

the remote MDaemon server by supplying an oversized argument to the CREATE imap<br />

command. An attacker may use this flaw to prevent other users from fetching their email. It<br />

will also crash other MDaemon services (SMTP, POP), thus preventing this server from<br />

receiving any email as well, or even to execute arbitrary code on this host with the<br />

privileges of the mdaemon IMAP daemon.<br />

Solution: Upgrade to MDaemon 6.7.10 or later.<br />

CVE-2003-1470<br />

Mozilla IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1095 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote e-mail<br />

client is Mozilla 1.3 or 1.4a which is vulnerable to a boundary condition error whereby a<br />

malicious IMAP server may be able to crash or execute code on the client.<br />

Solution: Upgrade to either 1.3.1 or 1.4a.<br />

CVE-2003-0298<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 279

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!