27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 1781 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. It is reported that versions prior 0.24.7<br />

contains an unspecified vulnerability. Due to the nature of the library, it is likely that this is<br />

a remotely exploitable vulnerability.<br />

Solution: Upgrade to Neon library 0.24.7 or higher.<br />

CVE Not available<br />

Opera < 7.54u1 Web Browser Resource Detection Weakness<br />

<strong>PVS</strong> ID: 1782 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using Opera, which is affected by a security<br />

weakness which may permit an attacker to determine the existence of a resources on the<br />

vulnerable computer.<br />

Solution: Install Opera 7.54u1 or higher.<br />

CVE-2004-1490<br />

ipop2d fold Command Arbitrary File Access<br />

<strong>PVS</strong> ID: 1783 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10469<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote pop2 server allows the reading of arbitrary files for<br />

authenticated users, using the 'fold' command.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

qpopper < 3.0.1b2 EIUDL Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1784 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10423<br />

Description: Synopsis :\n\nAn attacker can gain an unprivileged shell on the remote system.\n\nThe<br />

system is using qpopper 2.53 (or newer in the 2.5x series). There is a problem in this server<br />

that allows users who have a pop account to gain a shell with the gid 'mail' by sending to<br />

themselves a specially crafted mail.<br />

Solution: Upgrade to version 3.0.1b2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 453

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!