27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that may allow attackers to execute<br />

arbitrary commands\n\nsmrsh (supplied by Sendmail) is designed to prevent the execution<br />

of commands outside of the restricted environment. However, when commands are entered<br />

using either double pipes (||) or a mixture of dot and slash characters, a user may be able to<br />

bypass the checks performed by smrsh. This can lead to the execution of commands outside<br />

of the restricted environment.<br />

Solution: Upgrade to Sendmail 8.12.8 or higher.<br />

CVE-2002-1337<br />

MS SMTP NULL Session Mail Relay<br />

<strong>PVS</strong> ID: 2040 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11308<br />

Description: Synopsis :\n\nThe remote SMTP server may be inappropriately used as a relay.\n\nIt is<br />

possible to authenticate to the remote SMTP service by logging in as a NULL session. An<br />

attacker may exploit this flaw to use your SMTP server as a spam relay.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0054<br />

ISMail < 1.4.5 Multiple Command Domain Name Handling Overflow<br />

<strong>PVS</strong> ID: 2041 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11272<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ISMail, a SMTP server that is vulnerable to a buffer overflow. An attacker may<br />

exploit this flaw to gain LOCALSYSTEM privileges on this host.<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE Not available<br />

Youngzsoft CMailServer < 4.0.2003.03.30 RCPT TO Overflow<br />

<strong>PVS</strong> ID: 2042 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of CMailServer that is vulernable to a buffer overflow. An attacker may<br />

use this flaw to cause CMailServer to crash or execute arbitrary code.<br />

Solution: Upgrade to version 4.0.2003.03.30 or higher.<br />

CVE-2003-0280<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.12.10 prescan() Function Remote Overflow<br />

<strong>PVS</strong> ID: 2043 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11838<br />

Family Internet Services 521

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!