27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of Yahoo Instant Messenger that is reported vulnerable to<br />

several security flaws.<br />

Solution: Upgrade to version 6.0.0.1750 or higher.<br />

CVE-2005-0242<br />

Gaim < 1.1.3 Multiple DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 2631 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source multi-protocol instant<br />

messenger. It is reported that this version of Gaim is prone to multiple Denial of Service<br />

(DoS) vulnerabilities that may allow an attacker to disable this client remotely. An attacker<br />

exploiting this flaw would need to be able to initiate a chat session with the Gaim client. A<br />

successful exploit would result in the Gaim client crashing.<br />

Solution: Update to Gaim 1.1.3 or higher.<br />

CVE-2005-0473<br />

TrackerCam Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2632 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running TrackerCam. TrackerCam is a web server that allows remote users to view<br />

real-time video streams from an attached camera. This version of TrackerCam is vulnerable<br />

to multiple remote buffer overflows. An attacker exploiting one of these flaws would<br />

connect to the web server and send a large malformed request. Successful exploitation<br />

would result in the attacker being able to run arbitrary commands on the web server.<br />

Solution: Upgrade to a version of TrackerCam higher than 5.12.<br />

CVE-2005-0482<br />

Knox Arkeia <strong>Network</strong> Backup Agent Detection<br />

<strong>PVS</strong> ID: 2633 FAMILY: Generic RISK: HIGH NESSUS ID:17157<br />

Description: The remote host is running Arkea <strong>Network</strong> Backup agent, an agent system\ndesigned to<br />

remotely perform backups of the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 672

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!