27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mutt < 1.4.1 / 1.5 Address Handling Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1297 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that contains a buffer overflow in the email<br />

address handling routines. Exploitation of this overflow by an attacker may allow arbitrary<br />

code execution in the context of the Mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2002-0001<br />

Mutt < 1.4.1 / 1.5 IMAP Server Format String Vulnerability<br />

<strong>PVS</strong> ID: 1298 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' vulnerability\n\nThe remote<br />

host is running a version of the Mutt email client that contains a format string vulnerability.<br />

Due to improper handling of input from IMAP servers, it may be possible for a malicious<br />

IMAP server to send a specially crafted message to the mutt client that will cause execution<br />

of arbitrary code in the context of the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE Not available<br />

Mutt < 1.4.1 / 1.5 Text Enriched Handler Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1299 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that contains a buffer overflow in the handling<br />

routines for the text enriched MIME type. This vulnerability may allow malicious email<br />

messages to execute code in the context of the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE Not available<br />

Elm Alternative Folder Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1300 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Elm 2.4 PL3 which contains a buffer overflow accessible by passing a long string<br />

to the -f (Alternative-Folder) command-line option.<br />

Family Internet Services 332

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!