27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2001-1230<br />

Icecast < 1.3.10 Multiple Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2140 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version prior 1.3.10 is vulnerable to a remote buffer overflow that may permit an<br />

attacker to execute arbitrary code on the host. Most vulnerable versions usualy run as root.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-1229<br />

Icecast < 1.3.12-1 HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2141 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version prior to 1.3.12-1 is vulnerable to a remote buffer overflow that may permit an<br />

attacker to execute arbitrary code on the host.<br />

Solution: Upgrade to Icecast 1.3.12-1 or higher.<br />

CVE-2002-0177<br />

Icecast Server < 1.3.10 Crafted URI Remote DoS<br />

<strong>PVS</strong> ID: 2142 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of Icecast, an open-source streaming server. It<br />

is reported that every version prior to 1.3.10 is vulnerable to a remote denial of service. The<br />

problem occurs if an attacker crafts a malicious file request by appending '/', '\' or '.' at the<br />

end.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0784<br />

Icecast Server < 1.3.10 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2143 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a vulnerable version of Icecast, an<br />

open-source streaming server. It is reported that every version prior to 1.3.10 is vulnerable<br />

Family Internet Services 534

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!