27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server may be vulnerable to a remote buffer overflow that can be exploited by an attacker<br />

to gain a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.12.9 or higher.<br />

CVE-2003-0161<br />

Sendmail HELO Command Overflow<br />

<strong>PVS</strong> ID: 2032 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10260<br />

Description: Synopsis :\n\nThe remote mail server may inadvertently allow anonymous emails.\n\nThe<br />

remote Sendmail server accepts too long arguments to the HELO command, which may<br />

allow attackers to send email anonymously.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-1015<br />

Microsoft Exchange IMC SMTP EHLO Hostname Overflow<br />

<strong>PVS</strong> ID: 2033 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11053<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA security<br />

vulnerability results because of an unchecked buffer in the IMC code that generates the<br />

response to the EHLO protocol command. If the buffer were overrun with data it would<br />

result in either the failure of the IMC or could allow the attacker to run code in the security<br />

context of the IMC, which runs as Exchange 5.5 Service Account.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0698<br />

TFS SMTP < 4.0 Build 210 MAIL FROM Remote Overflow<br />

<strong>PVS</strong> ID: 2034 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10284<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote SMTP<br />

server (TFS SMTP) is vulnerable to a buffer overflow when it is issued a too long argument<br />

to the 'MAIL FROM' SMTP command. An attacker may exploit this vulnerability to run<br />

arbitrary commands on the remote SMTP server with the privileges of the SMTP daemon<br />

(typically, SYSTEM).<br />

Solution: Upgrade to TFS SMTP 4.0 Build 219 or higher.<br />

CVE-1999-1516<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Xtramail SMTP Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 2035 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10324<br />

Family Internet Services 519

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!