27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host may be tricked into downloading a malicious file\n\nThe<br />

remote host is running Outlook Express 5.0 for MacOS. This version of Express will<br />

automatically download attachments to HTML messages, without prompting the user. This<br />

weakness does not allow for a means of forcing the user to execute any code, or place files<br />

in a specific folder, but could be used in conjunction with other attacks.<br />

Solution: Upgrade to the latest version.<br />

CVE Not available<br />

Microsoft Outlook 98 / Outlook Express 4.x Long Filename Vulnerability<br />

<strong>PVS</strong> ID: 1294 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Outlook they may be vulernable to a buffer overflow. Specifically if<br />

an attacker sends an attachment with a very long filename, they may be able to execute<br />

arbitrary code and/or crash the victim machine.<br />

Solution: Apply patches available from Microsoft website.<br />

CVE-2000-0415<br />

Mutt < 1.4.1 / 1.5 IMAP Remote Folder Buffer Overflow Vulnerabilities<br />

<strong>PVS</strong> ID: 1295 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote<br />

host is running a version of the Mutt email client that may be vulnerable to a<br />

buffer overrun. A specially crafted folder on an IMAP server may be able to<br />

trigger these overflow conditions and cause the mutt client to crash.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2003-0167<br />

Mutt < 1.4.1 / 1.5 UTF-7 IMAP Remote Folder Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1296 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that may be vulnerable to a buffer overrun.<br />

Specifically, it has been reported that Mutt does not handle remote internationalized folders<br />

properly. Because of this, it is possible for a malicious server to launch an attack that could<br />

result in the execution of code as the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2003-0140<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 331

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!