27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to an unspecified buffer overflow, whose implications are not clear at<br />

this time.<br />

Solution: Upgrade to samba 2.2.5 or higher.<br />

CVE-2002-2196<br />

Samba-TNG < 0.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1341 FAMILY: Samba RISK: HIGH NESSUS ID:11442<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Samba-TNG server is vulnerable to multiple flaws that may let an attacker gain a root shell<br />

on this host. As the version number did not change with the update, this alert might be a<br />

false positive<br />

Solution: Upgrade to Samba-TNG 0.3.1<br />

CVE-2003-0085<br />

Samba < 2.2.8a trans2.c trans2open() Function Overflow<br />

<strong>PVS</strong> ID: 1342 FAMILY: Samba RISK: HIGH NESSUS ID:11523<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to a buffer overflow when it processes the function trans2open(). An<br />

attacker may exploit it to gain a root shell on this host. The remote host is running Samba<br />

version: \n %L<br />

Solution: Upgrade to Samba 2.2.8a or higher<br />

CVE-2003-0201<br />

Samba < 2.2.7 Unicode Encrypted Password Decryption Overflow<br />

<strong>PVS</strong> ID: 1343 FAMILY: Samba RISK: HIGH NESSUS ID:11168<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to a buffer overflow when a client requests a password change. An<br />

attacker may use it to cause a denial of service or execute arbitrary code on this host with<br />

root privileges<br />

Solution: Upgrade to Samba 2.2.7<br />

CVE-2002-1318<br />

SNMP Public Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1344 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 344

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!