27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ximian Evolution < 1.2.3 UUEncoding Overflow DoS / Data Injection<br />

<strong>PVS</strong> ID: 1307 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack and data<br />

injection.\n\nThe remote host is running a version of the Ximian Evolution email client that<br />

may be vulnerable to a Denial of Service attack or data injection. The Evolution mail client<br />

supports uuencoded content and decodes it automatically when a message is initially<br />

parsed. An attacker may be able to send a malformed message that will crash the mail<br />

client. Because Evolution automatically decodes uuencoded messages, the presence of the<br />

malformed message may cause a Denial of Service attack as the user will be unable to<br />

remove the message from her mailbox.<br />

Solution: Upgrade to Evolution 1.2.3 or higher.<br />

CVE-2003-0130<br />

Ximian Evolution < 1.2.3 MIME image/* Content-Type Data Injection<br />

<strong>PVS</strong> ID: 1308 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

remote host is running a version of the Ximian Evolution email client that does not properly<br />

validate MIME image/* Content-Type fields. If an email message contains an image/*<br />

Content-Type, any type of data can be embedded where the image information is expected.<br />

This can be used to embed HTML tags that will be rendered by GTKHtml, bypass policies,<br />

or invoke bonobo components to handle external content types.<br />

Solution: Upgrade to Evolution 1.2.3 or higher.<br />

CVE-2003-0130<br />

Mozilla Predictable Temporary File Symbolic Link Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1309 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a version of the Mozilla browser that<br />

follows symbolic links on lock files created in the /tmp directory, allowing a local attacker<br />

to create arbitrary files in the security context of the Mozilla user.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Netscape/Mozilla Null Character Cookie Disclosure<br />

<strong>PVS</strong> ID: 1310 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 335

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!