27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote qpopper service may be vulnerable to a denial of service (DoS) attack. If a<br />

string of longer than approximately 2048 characters is sent to the qpopper process, a denial<br />

of service condition will occur.<br />

Solution: Upgrade to the newest version.<br />

CVE-2002-0454<br />

Qualcomm Qpopper Remote Overflows<br />

<strong>PVS</strong> ID: 1793 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper<br />

daemon. These vulnerabilities are remotely executable and since the daemons run as root,<br />

the host running qpopper can be completely compromised anonymously.<br />

Solution: Upgrade to the newest version.<br />

CVE-2002-1781<br />

Qualcomm Qpopper Username Remote Overflow<br />

<strong>PVS</strong> ID: 1794 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nIn version 4, a buffer<br />

overflow was introduced into the qpopper source tree. This buffer overflow is related to the<br />

handling of the client-supplied username and is present when a POP3 session is being<br />

initiated. It is believed that the overflow occurs before authentication, so it may not be<br />

required that users have valid POP accounts. This vulnerability can lead to a compromise of<br />

root privileges to remote attackers.<br />

Solution: Upgrade to the latest version.<br />

CVE-2001-1046<br />

Computalynx CMail POP3 Server DELE Function DoS<br />

<strong>PVS</strong> ID: 1795 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial of service (DoS) attack.\n\nIt has<br />

been reported that a memory corruption vulnerability exists in CMail. The POP3 server<br />

included with CMAIL does not properly handle some types of requests. By submitting a<br />

maliciously crafted request to the POP3 server, an attacker could crash the system, resulting<br />

in a denial of service.<br />

Solution: Upgrade to the latest version.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 456

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!