27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web browser may be tricked into passing browsing information<br />

to a malicious website.\n\nThe remote host is running a version of the Mozilla browser that<br />

may allow access to information in other browser windows. Upon the execution of code<br />

through the 'onclick' property, a violation in browser security zone policy would occur that<br />

allows the original web site to view the contents of web pages in other browser windows.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Qualcomm Eudora Attachment Filename Handling Overflow<br />

<strong>PVS</strong> ID: 1324 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Eudora mail client that may be vulnerable to a buffer overflow<br />

when an attachment containing many dots is received. Exploitation of this vulnerability will<br />

crash the Eudora client and may allow for the execution of arbitrary code.<br />

Solution: Upgrade to the latest version of the mail client.<br />

CVE Not available<br />

Microsoft Outlook Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 1325 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Microsoft Outlook mail client that may be vulnerable to a buffer<br />

overflow. Specifically, it may be possible for a malicious IMAP server to send a specially<br />

crafted message to the Outlook client that will cause the exection of arbitrary code in the<br />

security context of the user.<br />

Solution: Upgrade to the latest version of the mail client.<br />

CVE Not available<br />

Pine < 4.58 Multiple Overflows<br />

<strong>PVS</strong> ID: 1326 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nPine versions 4.56 and below suffer from a vulnerability which allows an attacker<br />

to force the client to execute the attacker's code on the client's system. This issue is easily<br />

exploitable since the client will send it's version number by default allowing an attacker to<br />

easily identify potential targets.<br />

Solution: Upgrade to Version 4.58 or higher<br />

CVE-2003-0720<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 340

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!