27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2005-0606<br />

Gaim < 1.1.4 Remote DoS<br />

<strong>PVS</strong> ID: 2654 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source multi-protocol instant<br />

messenger. It is reported that this version of Gaim is prone to a flaw in the way that it<br />

handles malformed HTML data. An attacker exploiting this flaw would need to be able to<br />

communicate with a vulnerable GAIM user. Upon successful exploitation, the Gaim client<br />

would stop responding.\nThere is a second issue with this version of Gaim that is similar to<br />

the first. Specifically, downloaded files which include bracket characters like '(' or ')' will<br />

cause the client to crash.<br />

Solution: Update to Gaim 1.1.4 or higher.<br />

Gaim Detection<br />

CVE-2005-0208<br />

<strong>PVS</strong> ID: 2655 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host seems to be running Gaim, a popular open-source multi-protocol instant<br />

messenger.<br />

Solution: N/A<br />

CVE Not available<br />

PeerFTP Client Detection<br />

<strong>PVS</strong> ID: 2656 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running PeerFTP. PeerFTP is a peer-to-peer<br />

application that utilizes the FTP protocol. PeerFTP is both a client and a server application.<br />

The remote host is offering files for download as well as downloading files. Further, as the<br />

host is running PeerFTP version 5, there is a flaw in the way that passwords are stored. All<br />

passwords are stored locally as plaintext.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0517<br />

BadBlue < 2.60 'GET' Request Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2657 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 679

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!