27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computalynx CMail < 2.4.10 HELO Command Overflow<br />

<strong>PVS</strong> ID: 1796 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA security<br />

vulnerability in CMail 2.4.9 allows remote attackers to overflow one of CMail's internal<br />

buffers causing it to crash. If shellcode is provided in the overflowing buffer it may be<br />

possible to execute arbitrary code.<br />

Solution: Upgrade to 2.4.10 or higher.<br />

CVE-2001-0742<br />

ALT-N MDaemon < 6.5.0 POP Server Overflow DoS<br />

<strong>PVS</strong> ID: 1797 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nA<br />

buffer overflow vulnerability has been reported for MDaemon. The vulnerability is due to<br />

inadequate bounds checking one some POP server commands. An attacker can exploit this<br />

vulnerability by submitting a very large integer value to some commands on the POP<br />

server. This will cause the MDaemon service to crash when attempting to process the<br />

command.<br />

Solution: Upgrade to MDaemon 6.5.0 or higher.<br />

CVE-2002-1539<br />

Xtramail < 1.12 POP3 Overflow<br />

<strong>PVS</strong> ID: 1798 FAMILY: POP Server RISK: HIGH NESSUS ID:10325<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Xtramail<br />

POP server is vulnerable to a buffer overflow when the user supplies a long password<br />

string. An attacker may use this flaw to execute arbitrary code on this host with the<br />

privileges of the Xtramail server (typically, SYSTEM).<br />

Solution: Upgrade to version 1.12 or higher.<br />

CVE-1999-1511<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Xtramail < 1.12 Control Server Overflow Denial of Service<br />

<strong>PVS</strong> ID: 1799 FAMILY: POP Server RISK: HIGH NESSUS ID:10323<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Xtramail<br />

Control Server is vulnerable to a buffer overflow when a user supplies a too long argument<br />

to as its username. An attacker may use this flaw to disable this service remotely or to<br />

execute arbitrary code on this host, with the privileges of the Xtramail server (typically,<br />

SYSTEM).<br />

Family Internet Services 457

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!