27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Sendmail server discloses too much information to local users when<br />

the command 'sendmail -q -d0-nnn.xxx' is executed. A local attacker may use this flaw to<br />

gather data about your local sendmail configuration.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0715<br />

Sendmail DEBUG Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 2028 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10247<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server accepts the DEBUG mode. An attacker may<br />

use it to gain a shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-0095<br />

Sendmail < 8.8.3 Local Overflow<br />

<strong>PVS</strong> ID: 2029 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11346<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server may allow a local user to gain root<br />

privileges.<br />

Solution: Upgrade to Sendmail 8.8.3 or higher.<br />

CVE-1999-0130<br />

Sendmail < 8.12.1 Custom Configuration File Privilege Escalation<br />

<strong>PVS</strong> ID: 2030 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11086<br />

Description: Synopsis :\n\nThe remote host may allow a local attacker to escalate privileges. \n\nThe<br />

remote sendmail server may be vulnerable to a mail system compromise if a rogue local<br />

user supplies a custom configuration file.<br />

Solution: Upgrade to version 8.12.1 or higher.<br />

CVE-2001-0713<br />

Sendmail < 8.12.9 NOCHAR Value Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2031 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11499<br />

Family Internet Services 518

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!