27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Merak Mail Server 7.5.2 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Merak Mail Server < 7.5.2 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2158 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Solution: Upgrade to Merak Mail Server 7.5.2 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Gaim < 0.82 Multiple Overflows<br />

<strong>PVS</strong> ID: 2159 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to multiple vulnerabilities including several<br />

buffer and heap overflows. These vulnerabilities may permit an attacker to execute<br />

arbitrary code on the remote computer.<br />

Solution: Upgrade to Gaim 0.82.0 or higher.<br />

CVE-2004-0785<br />

Gaim < 0.82 MSN Protocol Buffer Overflow<br />

<strong>PVS</strong> ID: 2160 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to several buffer overflows in the MSN protocol<br />

implementation. This vulnerability may permit an attacker to execute arbitrary code on the<br />

remote computer.<br />

Solution: Upgrade to Gaim 0.82.0 or higher or disable the MSN protocol module.<br />

CVE-2004-0500<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Gaim / Ultramagnetic Multiple <strong>Security</strong> Vulnerabilities<br />

<strong>PVS</strong> ID: 2161 FAMILY: Internet Messengers NESSUS ID:Not Available<br />

Family Internet Services 539

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!