27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2137<br />

Winamp < 5.05 .WSZ File Handling Remote Code Execution<br />

<strong>PVS</strong> ID: 2151 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

code execution issue. This vulnerability may be used to remotely execute arbitrary code on<br />

the host by crafting a malicious .WSZ file (Winamp Skin).<br />

Solution: Upgrade to Winamp 5.05 or higher.<br />

CVE Not available<br />

ignitionServer < 0.3.2 SERVER Command Remote DoS<br />

<strong>PVS</strong> ID: 2152 FAMILY: IRC Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running an ignitionServer IRC server. This version of ignitionServer is<br />

reported to be prone to a remote denial of service in the processing of the SERVER IRC<br />

command. An attacker may crash or hang the remote server, denying service to legitimate<br />

users.<br />

Solution: Upgrade to version 0.3.2 or higher.<br />

CVE Not available<br />

Unreal IRCD < 3.2.1 Cloak IP Address Disclosure<br />

<strong>PVS</strong> ID: 2153 FAMILY: IRC Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of Unreal IRCD that is prone to a cloaked<br />

IP address disclosure issue. An attacker may use its own IP and the corresponding hash in<br />

order to find the server cloak keys. This vulnerability could permit an attacker to gather<br />

valid IP addresses in order to carry out attacks on them.<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2004-0679<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Unreal IRCD OperServ Raw Message Channel Join DoS<br />

<strong>PVS</strong> ID: 2154 FAMILY: IRC Servers NESSUS ID:Not Available<br />

Family Internet Services 537

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!