27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Do not use the WebBrowser control to view messages: go to Tools -> Options -> Viewing<br />

Mail and uncheck "Use Microsoft's viewer".<br />

CVE-2002-1770<br />

Qualcomm Eudora Hidden Attachment Execution Vulnerability<br />

<strong>PVS</strong> ID: 1287 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may allow attackers to run arbitrary code\n\nThe remote<br />

host is running a version of the Eudora mail client that may contain a vulnerability allowing<br />

an attacker to execute arbitrary code on the remote host even if 'allow executables in<br />

HTML content' is disabled, if the 'Use Microsoft Viewer' is enabled.<br />

Solution: Disable the 'Use Microsoft Viewer' option.<br />

CVE-2001-0365<br />

Qualcomm Eudora Client and Path Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 1288 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote host is running a version of the Eudora mail client that may disclose<br />

path information in email messages under certain condtions. If a message containing an<br />

attachement is replied to (by an individual running this version of Eudora), the reply<br />

message is sent with an appended string containing the full path of the attached file<br />

revealing the directory structure of the client.<br />

Solution: Disable the 'Use Microsoft Viewer' option.<br />

CVE-2000-0874<br />

Qualcomm Eudora 4.2/4.3 Warning Message Circumvention Vulnerability<br />

<strong>PVS</strong> ID: 1289 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

remote host is running a version of the Eudora mail client that doesn't properly warn when<br />

a user attempts to view an executable attachment. Specifically it doesn't give out warning<br />

messages if a user attempts to open a file that doesn't have one of the following extensions:<br />

.exe, .com, .bat. So, for example, an attacker can bypass the warnings by using a .lnk file to<br />

launch an executable.<br />

Solution: Edit the Eudora.ini file and add lnk to the WarnLaunchExtensions list or upgrade to the<br />

latest version<br />

Family Internet Services 329

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!