27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running YoungZSoft CMail Server, a mail server for<br />

Microsoft Windows. There are multiple remote vulnerabilities such as buffer overflows,<br />

SQL injection, and HTML injection in the remote version of this software that may allow<br />

an attacker to execute arbitrary code on the remote host.<br />

Solution: Upgrade to version 5.2.1 or higher.<br />

CVE-2004-1129<br />

KorWeblog < 1.6.2 Remote Directory Listing<br />

<strong>PVS</strong> ID: 2433 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using KorWeblog, a web-based log application written in<br />

PHP. A vulnerability exists in the remote version of this product that may allow a remote<br />

attacker to disclose directory listings. Information disclosures could help the attacker in<br />

further attacks.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2004-1427<br />

Open DC Hub RedirectAll Value Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2434 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Open DC Hub, a peer to peer file sharing application, that is<br />

vulnerable to a remote buffer overflow. A successful exploit would allow a remote attacker<br />

to execute code on the remote host. It must be noted that the remote attacker needs<br />

administrative access to this application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1127<br />

MailEnable < 1.53 IMAP Service Multiple Remote Pre-Authentication Buffer Overflows<br />

<strong>PVS</strong> ID: 2435 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15852<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of MailEnable Professional that is older than version 1.53. The remote<br />

version of this software is known to be prone to multiple remote buffer overflow<br />

vulnerabilities that have been fixed in version 1.53.<br />

Solution: Upgrade to version 1.53 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 617

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!