27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Pavuk 0.9.31 or higher.<br />

CVE Not available<br />

Samba < 3.0.8 Remote Wild Card DoS and QFILEPATHINFO Remote Overflow<br />

<strong>PVS</strong> ID: 2397 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server, according to its version number, may be vulnerable to a remote Denial Of Service<br />

vulnerability and a remote buffer overflow.\n The Wild Card DoS vulnerability may allow<br />

an attacker to make the remote server consume excessive CPU cycles.\nThe<br />

QFILEPATHINFO remote buffer overflow vulnerability may allow an attacker to execute<br />

code on the server.\n An attacker needs credentials to exploit those flaws.<br />

Solution: Upgrade to Samba 3.0.8 or higher.<br />

CVE-2004-0882<br />

eGroupWare < 1.0.0.006 JiNN Application Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2398 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running eGroupWare, a web-based groupware solution. It is reported that<br />

versions prior 1.0.0.006 are prone to an unspecified vulnerability.<br />

Solution: Upgrade to eGroupWare 1.0.0.006 or higher.<br />

CVE-2005-1202<br />

EZ-IPupdate show_message() Remote Format String<br />

<strong>PVS</strong> ID: 2399 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using a version of EZ-IPupdate, a tool to update DNS records, that is vulnerable to a<br />

remote format string flaw. This vulnerability is present only if EZ-IPupdate runs in daemon<br />

mode<br />

Solution: No solution is known at this time.<br />

CVE-2004-0980<br />

04WebServer Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2400 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 607

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!