27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host has the EXPN command enabled. An attacker may use it to<br />

enumerate valid accounts on this host and gain more information about them.<br />

Solution: Disable this option in your MUA configuration file.<br />

CVE Not available<br />

Sendmail < 8.10.1 ETRN Command Remote DoS<br />

<strong>PVS</strong> ID: 2024 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote SMTP server has a flaw that may allow remote attackers to cause a denial of service<br />

by sending a series of ETRN commands and then disconnecting from this server.<br />

Solution: Upgrade to Sendmail 8.10.1 or higher.<br />

CVE-1999-1109<br />

Sendmail < 8.12.5 DNS Map TXT Query Overflow<br />

<strong>PVS</strong> ID: 2025 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11232<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a buffer overflow in the portion of its code that handles DNS replies.<br />

The owner of a malicious DNS server could use this flaw to execute arbitrary code on this<br />

host.<br />

Solution: Upgrade to Sendmail 8.12.5 or higher.<br />

CVE-2002-0906<br />

Sendmail 'decode' Alias Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 2026 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10248<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server may pipe email sent to the 'decode' alias to a<br />

program, which is prone to various security issues.<br />

Solution: Remove the 'decode' entry from /etc/aliases.<br />

CVE-1999-0096<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail ResrictQueueRun Debug Information Disclosure<br />

<strong>PVS</strong> ID: 2027 FAMILY: SMTP Servers RISK: LOW NESSUS ID:11088<br />

Family Internet Services 517

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!