27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

if the account 'someusername' exists or not.<br />

Solution: No solution is known at this time.<br />

CVE-2000-0960<br />

qpopper Options File Buffer Overflow<br />

<strong>PVS</strong> ID: 1789 FAMILY: POP Server RISK: HIGH NESSUS ID:10948<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote qpopper<br />

server, according to its banner, is running version 4.0.3 or version 4.0.4. These versions are<br />

vulnerable to a buffer overflow if they are configured to allow the processing of a user's<br />

~/.qpopper-options file. A local user can cause a buffer overflow by setting the bulldir<br />

variable to something longer than 256 characters. *** This test could not confirm the<br />

existence of the problem - it relied on the banner being returned. ***<br />

Solution: Upgrade to the latest version, or disable processing of user option files.<br />

ZetaMail Remote DoS<br />

CVE-2001-1046<br />

<strong>PVS</strong> ID: 1790 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

ZetaMail server will crash if a username/password pair longer than 3500 characters is<br />

supplied by the client.<br />

Solution: Upgrade to the latest version.<br />

CVE-2002-0799<br />

Delegate Multiple Function Remote Overflows<br />

<strong>PVS</strong> ID: 1791 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDelegate is reportedly<br />

vulnerable to a stack-based buffer overflow that may allow for the execution of arbitrary<br />

code. The condition exists if the argument to the 'USER' command is of excessive length.<br />

Solution: Contact the vendor for a patch or upgrade.<br />

CVE-2002-0799<br />

Qualcomm Qpopper Remote Overflow DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1792 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Family Internet Services 455

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!