27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Unreal IRCD that is vulnerable to a remote denial of<br />

service. It is reported that Unreal IRCD may crash when a client sends a raw message to<br />

OperServ to join a channel. An attacker may use this issue to deny service to legitimate<br />

users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

CVS history.c File Existence Disclosure<br />

<strong>PVS</strong> ID: 2155 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14313<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a CVS server that, according to its version number,<br />

is vulnerable to an information disclosure issue. This weakness can be exploited by<br />

malicious users to gain knowledge about files and directories existing on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0778<br />

Merak Mail Server < 7.5.1 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2156 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Solution: Upgrade to Merak Mail Server 7.5.1 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Merak Mail Server < 7.5.2 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2157 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Family Internet Services 538

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!