27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian versions 0.73, 0.74 and possibly other versions are<br />

vulnerable to a buffer overflow, caused by improper validation of JOIN commands<br />

received from an IRC server. If a Trillian client connects to an attacker-controlled IRC<br />

server and joins a channel with a name containing more than 206 characters, the attacker<br />

could overflow a buffer and cause the victim's Trillian client to crash or execute code on<br />

the system.<br />

Solution: No solution is known at this time.<br />

CVE-2002-1486<br />

XChat Malformed Nickname Remote Format String<br />

<strong>PVS</strong> ID: 1873 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the XChat IRC client. XChat IRC client version 1.2.x is vulnerable to a<br />

format string attack. A remote attacker can create a specially crafted nickname that would<br />

cause arbitrary code to be executed on the system once a connection is established.<br />

Solution: No solution is known at this time.<br />

CVE-2001-0792<br />

XChat /dns Reverse Lookup Response Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1874 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw which allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running the XChat IRC client. X-Chat versions<br />

1.8.8 and earlier could allow a remote attacker to execute arbitrary commands on the<br />

X-Chat client. A vulnerability regarding the lack of filtering in the EXECL command could<br />

allow an attacker to send a specially crafted /dns query that would return a malformed<br />

response from the server to execute arbitrary commands on the X-Chat client.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0382<br />

XChat CTCP Ping Arbitrary Remote IRC Command Execution<br />

<strong>PVS</strong> ID: 1875 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw which allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running the XChat IRC client. X-Chat versions<br />

1.4.2 and 1.4.3 could allow a remote attacker to execute IRC commands. A remote attacker<br />

can send a specially crafted CTCP ping request to execute IRC commands on the IRC<br />

server and gain elevated privileges.<br />

Family Internet Services 477

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!