27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server is vulnerable to an 'ident overflow' that may<br />

allow a remote attacker to gain a root shell on this host.<br />

Solution: Upgrade to version 8.6.10 or higher.<br />

CVE-1999-0204<br />

Sendmail < 8.12.8 Header Handling Remote Overflow<br />

<strong>PVS</strong> ID: 2020 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11316<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a remote buffer overflow that may allow an attacker to remotely gain<br />

a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.12.8 or higher.<br />

CVE-2002-1337<br />

Sendmail < 8.8.4 Group Permissions Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2021 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11349<br />

Description: Synopsis :\n\nThe remote server may allow local users to escalate privileges.\n\nThe<br />

remote Sendmail server is vulnerable to a flaw that may allow local users to gain the group<br />

permission of the sendmail server by crafting a .forward file.<br />

Solution: Upgrade to Sendmail 8.8.4 or higher.<br />

CVE-1999-0129<br />

EXPN Command Information Disclosure<br />

<strong>PVS</strong> ID: 2022 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10249<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host has the EXPN command enabled. An attacker may use it to<br />

enumerate valid accounts on this host and gain more information about them.<br />

Solution: Disable this option in your MUA configuration file.<br />

CVE Not available<br />

EXPN Command Information Disclosure<br />

<strong>PVS</strong> ID: 2023 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10249<br />

Family Internet Services 516

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!