27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 2425 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to a pre-login buffer overflow. Cyrus<br />

IMAP server is also vulnerable to three other buffer overflows after authentication. An<br />

attacker with or without a valid login could exploit these issues, and would be able to<br />

execute arbitrary commands as the owner of the Cyrus process.<br />

Solution: Upgrade to Cyrus IMAPD 2.2.10 or higher.<br />

CVE-2004-1067<br />

Nullsoft Winamp < 5.0.7 IN_CDDA.dll Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2426 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

buffer overflow. This vulnerability may be used to remotely execute arbitrary code on the<br />

host by invoking a malicious playlist. IN_CDDA.dll will fail to parse it correctly and an<br />

attacker will be able to exploit the buffer overflow.<br />

Solution: Upgrade to Winamp 5.0.7 or higher.<br />

CVE-2004-1119<br />

Van Dyke SecureCRT < 4.1.9 Telnet URI Remote Command Execution<br />

<strong>PVS</strong> ID: 2427 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows<br />

operating systems. It has been reported that SecureCRT does not safely check the protocol<br />

handler. As a result, an attacker may be able to exploit it by setting up a malicious SMB<br />

share.<br />

Solution: Upgrade to SecureCRT 4.1.9 or higher.<br />

CVE-2004-1541<br />

ProZilla Multiple Remote Buffer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2428 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Prozilla, a download accelerator for Linux and Unix systems. The remote version<br />

of this software contains multiple security issues that may allow an attacker to execute code<br />

on the remote host.\nAn attacker needs to create a malicious HTTP server and entice the<br />

user to download a file on this server.<br />

Family Internet Services 615

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!