27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2000-0320<br />

qpopper < 4.0 PASS Command Remote Overflow<br />

<strong>PVS</strong> ID: 1785 FAMILY: POP Server RISK: HIGH NESSUS ID:10196<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a<br />

vulnerability in some versions of qpopper which allows a remote user to become root using<br />

a buffer overflow.<br />

Solution: Upgrade to version 4.0 or higher.<br />

CVE-1999-0006<br />

qpopper < 4.0.5fc2 Qvsnprintf Remote Overflow<br />

<strong>PVS</strong> ID: 1786 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11376<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote qpopper<br />

server, according to its banner, is vulnerable to a one-byte overflow in the function<br />

Qvsnprintf(). An attacker may use this flaw to gain a (non-root) shell on this host, provided<br />

that the attacker has a valid POP account to log in with.<br />

Solution: Upgrade to version 4.0.5fc2 or higher.<br />

CVE-2003-0143<br />

ipop2d < 4.5 FOLD Command Remote Overflow<br />

<strong>PVS</strong> ID: 1787 FAMILY: POP Server RISK: HIGH NESSUS ID:10130<br />

Description: Synopsis :\n\nThe remote server allows attackers to gain an unprivileged shell.\n\nThere is<br />

a buffer overflow in the imap suite provided with Debian GNU/Linux 2.1 that has a<br />

vulnerability in its POP-2 daemon found in the ipopd package. This vulnerability allows an<br />

attacker to gain a shell as user 'nobody', but requires the attacker to have a valid pop2<br />

account.<br />

Solution: Upgrade to version 4.5 or higher.<br />

CVE-1999-0920<br />

Netscape Messenging Server User Account Enumeration<br />

<strong>PVS</strong> ID: 1788 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10681<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote POP server allows an attacker to obtain a list of valid logins on the<br />

remote host via a brute force attack. If the user connects to this port and issues the<br />

commands : USER 'someusername' PASS 'whatever' a different response will be generated<br />

Family Internet Services 454

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!