27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a HTTP 'splitting' attack.\n\nThe remote<br />

host is running WordPress BLOG. WordPress BLOG is a PHP software package that is<br />

used to generate HTML BLOGS via a web interface. This version is vulnerable to an<br />

HTTP-splitting attack where an attacker can insert CRLF characters and then entice an<br />

unsuspecting user into accessing the URL. The client will parse and possibly act on the<br />

secondary header that was supplied by the attacker.<br />

Solution: Upgrade to version 1.2.1 or higher.<br />

CVE-2004-1584<br />

Helix RealServer Remote Integer Handling DoS<br />

<strong>PVS</strong> ID: 2357 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nRealServer versions 9.0.4.958 and prior as well as 10.3.1.716 and prior are<br />

vulnerable to a remote Denial of Service (DoS) attack when they are presented with an<br />

invalid (negative) integer for the Content-Length field. An attacker exploiting this flaw<br />

would need to be able to connect to the RealServer (default port 554) and issue a<br />

malformed request. A successful attack would consume large amounts of memory on the<br />

RealServer, eventually ending in the unavailability of the server.<br />

Solution: Upgrade to version 9.0.4.960, 10.3.1.718 or higher.<br />

CVE-2004-0774<br />

Microsoft SMTP DNS Lookup Overflow (885881)<br />

<strong>PVS</strong> ID: 2358 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15464<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Microsoft SMTP server that is vulnerable to a buffer overflow<br />

issue.\n\nAn attacker may exploit this flaw to execute arbitrary commands on the remote<br />

host with the privileges of the SMTP server process.<br />

Solution: http://www.microsoft.com/technet/security/bulletin/MS04-035.mspx<br />

CVE-2004-0840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft NNTP Component Remote Overflow (883935)<br />

<strong>PVS</strong> ID: 2359 FAMILY: Generic RISK: HIGH NESSUS ID:15465<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Microsoft NNTP server that is vulnerable to a buffer overflow<br />

issue.\n\nAn attacker may exploit this flaw to execute arbitrary commands on the remote<br />

host with the privileges of the NNTP server process.<br />

Family Internet Services 595

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!