27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 2.0.51 or higher.<br />

CVE-2004-0748<br />

Squid NTLM Authentication NTLMSSP Packet Remote DoS<br />

<strong>PVS</strong> ID: 2255 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe remote<br />

server is running a Squid proxy server. This version is reported vulnerable to a remote denial of<br />

service in the NTLM authentication routine. If NTLM authentication is enabled, an attacker<br />

may deny service to legitimate users by sending malformed NTLMSSP packets.<br />

Solution: Apply the relevant patch from<br />

http://www.squid-cache.org/squid/Versions/v2/2.5/bugs/squid-2.5.STABLE6-ntlm_fetch_string.patch<br />

CVE-2004-0832<br />

Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2256 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Ipswitch IMail, a server that sends clients email via a web interface.<br />

It runs on Microsoft Windows operating systems. Ipswitch IMail is reported to be<br />

vulnerable to multiple remote denial of service in the following modules: 'Queue Manager',<br />

'Web Messaging' and 'Web Calendar'. An attacker may use these weakness to deny service<br />

to legitimate users. It is conjectured that these issues may allow remote arbitrary code<br />

execution.<br />

Solution: Upgrade to IMail 8.13.0 or higher.<br />

CVE-2004-2422<br />

Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2257 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Ipswitch IMail, an server that sends clients email via a web<br />

interface. It runs on Microsoft Windows operating systems. Ipswitch IMail is reported to be<br />

vulnerable to multiple remote denial of service in the following modules: 'Queue Manager',<br />

'Web Messaging' and 'Web Calendar'. An attacker may use these weakness to deny service<br />

to legitimate users. It is conjectured that these issues may allow remote arbitrary code<br />

execution.<br />

Family Internet Services 566

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!