27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Cherokee web server. This version is vulnerable to a remote format<br />

string overflow. An attacker exploiting this flaw would only need to be able to connect to<br />

the web server and issue an HTTP 'GET' request. Upon successful exploitation, the attacker<br />

would be able to execute commands within the context of the web server.<br />

Solution: Upgrade to version 0.4.17.1 or higher.<br />

CVE-2004-1097<br />

MailEnable SMTP Server < 1.5.1 Undisclosed Vulnerabilities<br />

<strong>PVS</strong> ID: 2384 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15611<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of MailEnable Professional that is older than version 1.5.1.<br />

The remote version of this software is known to be prone to an undisclosed vulnerability<br />

that has been fixed in version 1.5.1.<br />

Solution: Upgrade to version 1.5.1 or higher.<br />

CVE Not available<br />

ArGoSoft FTP Server < 1.4.2.2 Shortcut File Upload<br />

<strong>PVS</strong> ID: 2385 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft FTP Server. It is<br />

reported that ArGoSoft FTP Server is prone to a vulnerability that allows a shortcut link<br />

upload. An attacker exploiting this flaw may be able to have read and write access to any<br />

files and directories on the FTP server.<br />

Solution: Upgrade to version 1.4.2.2 or higher.<br />

CVE-2004-1428<br />

MailPost.exe Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2386 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15626<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of TIPS MailPost that is vulnerable to several flaws.\nTIPS MailPost is<br />

an HTML form content email application designed to facilitate\nthe emailing of HTML<br />

form data to a third party.\nThere are various flaws in the remote version of this software<br />

:\n- A remote file enumeration vulnerability that may allow an attacker to determine if a file<br />

exists or not\n\n- Two cross-site scripting vulnerabilities that may allow an attacker to steal<br />

the cookies of third-parties users\n\n- An information disclosure vulnerability that may<br />

allow an attacker to gain more information about the remote host<br />

Family Internet Services 603

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!