27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Sendmail server does not properly identiy the '.\n' string which identifies the end of<br />

message text. An attacker may use this flaw to remotely corrupt user mailboxes by sending<br />

a message line which is 2047 characters long and end in '.\n'.<br />

Solution: Install sendmail 8.10.0 or higher.<br />

CVE-2000-0319<br />

Sendmail < 8.6.8 Long Debug Local Overflow<br />

<strong>PVS</strong> ID: 2016 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11348<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server allows local users to escalate their privileges due to a buffer overflow in the debug<br />

(-d) command line option of Sendmail.<br />

Solution: Upgrade to Sendmail 8.6.8 or higher.<br />

CVE-1999-1309<br />

Eserv SMTP Memory Leak<br />

<strong>PVS</strong> ID: 2017 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11619<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote SMTP server is running Eserv SMTP. There is a memory leak in this software that<br />

may be abused by an attacker to disable this service remotely.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Sendmail < 8.11.6 Local Overflow<br />

<strong>PVS</strong> ID: 2018 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10729<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a local buffer overflow that may allow local users to gain root<br />

privileges.<br />

Solution: Upgrade to Sendmail 8.11.6 or higher.<br />

CVE-2001-0653<br />

Sendmail < 8.6.10 IDENT Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2019 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10278<br />

Family Internet Services 515

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!