27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

libNSS Hello Challenge Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2133 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of the Mozilla web browser. This version is based on a<br />

vulnerable version of libNSS, the <strong>Network</strong> <strong>Security</strong> Service library that implements the<br />

SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote<br />

heap overflow in the processing of the 'hello' message. An attacker may use this overflow<br />

to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0826<br />

libNSS Hello Challenge Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2134 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of the Netscape Enterprise Server, iPlanet or Sun<br />

ONE Web Server. This version is based on a vulnerable version of libNSS, the <strong>Network</strong><br />

<strong>Security</strong> Service library that implements the SSL/TLS protocol. It is reported that versions<br />

of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello'<br />

message. An attacker may use this overflow to execute arbitrary code on the remote host.<br />

<strong>PVS</strong> detected the following version of the webserver: \n %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0826<br />

Bird Chat Server Invalid User DoS<br />

<strong>PVS</strong> ID: 2135 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of Bird Chat Server. Bird Chat Server is a small<br />

chat server for Windows. It is reported that versions up to 6.10 are prone to an issue that<br />

permit an attacker connecting with a fake username on the server to remotely crash all<br />

clients using the server.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1739<br />

Icecast list.cgi User-Agent XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2136 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 532

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!