27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple Denial of Service (DoS)<br />

attacks\n\nThe remote host is running SAMI FTP server. There is a bug in the way some<br />

versions of this server handles certain FTP command requests which may allow an attacker<br />

to trigger a remote Denial of Service (DoS) attack against the server.<br />

Solution: Ensure that your version of SAMI FTP server is patched to the latest revision.<br />

CVE-2004-2081<br />

Xlight FTP Server < 1.53 RETR Command Remote Overflow<br />

<strong>PVS</strong> ID: 1166 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running XLight FTP server. There is a bug in the way this server handles arguments to the<br />

RETR command that may allow an attacker to trigger a buffer overflow against this server,<br />

potentially allowing him to disable this server remotely or to execute arbitrary code.<br />

Solution: Upgrade XLight Server to version 1.53 or later.<br />

CVE-2004-0255<br />

Apache-SSL < 1.3.29 / 1.53 SSLVerifyClient SSLFakeBasicAuth Client Certificate Forgery<br />

<strong>PVS</strong> ID: 1167 FAMILY: Web Servers RISK: HIGH NESSUS ID:12046<br />

Description: Synopsis :\n\nThe remote server is configured to allow a potential bypass of<br />

authorization\n\nThe remote host is running a version of ApacheSSL which is older than<br />

1.3.29/1.53. This version is vulnerable to a flaw which may allow an attacker to make the<br />

remote server forge a client certificate.<br />

Solution: Upgrade to version ApacheSSL 1.3.29/1.53 or later.<br />

CVE-2004-0009<br />

Serv-U FTP Server < 4.2 SITE CHMOD Command Handling Overflow<br />

<strong>PVS</strong> ID: 1168 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12037<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Serv-U FTP server. There is a bug in the way this server handles arguments to the<br />

SITE CHMOD requests which may allow an attacker to trigger a buffer overflow against<br />

this server, which may allow him to disable this server remotely or to execute arbitrary<br />

code on this host.<br />

Solution: Upgrade Serv-U FTP Server version 4.2 or later.<br />

CVE-2004-2533<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 297

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!