27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 2310 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for Windows operating systems. It is<br />

reported that versions up to and including 6.5.1 are prone to multiple buffer overflows. An<br />

attacker may deny service to legitimate users or execute arbitrary code on the remote<br />

server. The attacker needs to authenticate in order to exploit these vulnerabilities against<br />

the IMAP server but it doesn't need to do so against the SMTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1546<br />

Alt-N MDaemon Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 2311 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for Windows operating systems. It is<br />

reported that versions up to and including 6.5.1 are prone to multiple buffer overflows. An<br />

attacker may deny service to legitimate users or execute arbitrary code on the remote<br />

server. The attacker needs to authenticate in order to exploit these vulnerabilities against<br />

the IMAP server but it doesn't need to do so against the SMTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1546<br />

YaBB < Gold SP 1.3.2 Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2312 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable version of YaBB. It is reported that versions up to and<br />

including 1 Gold SP 1.3.1 are prone to multiple input validation vulnerabilities. Using these<br />

weaknesses, an attacker may influence how web content is served, cached and interpreted<br />

or perform cross-site scripting attacks to steal cookie-based authentication credentials from<br />

an unsuspecting user.<br />

Solution: Upgrade to YaBB Gold SP 1.3.2 or higher.<br />

CVE-2004-2139<br />

Host DHCP Address Release<br />

<strong>PVS</strong> ID: 2313 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host released its DHCP lease.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 582

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!