27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running a version of the Eudora mail client that may be vulnerable to a DoS<br />

attack. Specifically, a remote user can create a DoS attack by sending a file with an<br />

exceptionally long name. This does not cause an exploitable buffer overflow but crashes<br />

the program.<br />

Solution: Upgrade to Version 5.2 or higher.<br />

CVE Not available<br />

Qualcomm Eudora File Attachment Spoofing Vulnerability<br />

<strong>PVS</strong> ID: 1284 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nBy spoofing file extensions, an attacker may be able to coerce malicious code<br />

execution\n\nThe remote client is running a version of the Eudora mail client that may be<br />

vulnerable to an issue where a remote attacker may spoof the file extension in an<br />

attachment. This may aid the attacker in enticing a user of the email client into executing<br />

malicious content, and in avoiding generating warning messages.<br />

Solution: Upgrade to the latest version of Eudora<br />

CVE-2002-2351<br />

Qualcomm Eudora MIME Multipart Boundary Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1285 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote client is<br />

running a version of the Eudora mail client that may be vulnerable to a buffer overflow.<br />

This condition may occur if a MIME multipart boundary is of excessive length. Remote<br />

attackers may exploit this vulnerability to execute arbitrary code.<br />

Solution: Upgrade to the latest version of Eudora<br />

CVE-2002-0833<br />

Qualcomm Eudora WebBrowser Control Embedded Media Player File Vulnerability<br />

<strong>PVS</strong> ID: 1286 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw\n\nThe remote host is running a version of the Eudora mail client that may have<br />

vulernabilities regarding how it handles attachments. Specifically if the client is using the<br />

WebBrowser control to view messages, then an attacker may be able to craft a message<br />

containing malicious code that will be run on the victims computer.<br />

Solution:<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 328

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!