27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

not exist, then the server may crash. At the least, this would cause a Denial of Service<br />

(DoS) against the service and attached users.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0657<br />

Mozilla < 1.7.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2671 FAMILY: Web Clients RISK: HIGH NESSUS ID:17604<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla, a web browser. The remote version of this software contains<br />

the following security flaws: \n1) There is a flaw in the way that the browser handles<br />

scripting within 'tabbed' cross-domains. An attacker exploiting this flaw would need to be<br />

able to convince a user to click on a malicious URL which would then open a separate<br />

'TAB' within the browser. The attacker could then retrieve data relevant to other tabbed<br />

connections or execute code locally.\n2)There is a flaw in the default about: config script<br />

that would allow an attacker to modify configuration data. In order to execute such an<br />

attack, the attacker would need to be able to entice the user into visiting or clicking on a<br />

malicious URL. A successful attacker would be able to modify the local configuration file,<br />

resulting in enhanced access rights or other potential exploits. In addition, there are other<br />

unconfirmed flaws in Mozilla version 1.7.5 and lower. The reported browser version (as<br />

seen on the network) is: \n %L<br />

Solution: Upgrade to Mozilla 1.7.6 or higher.<br />

CVE-2005-0231<br />

Sylpheed < 1.0.3 Invalid Header Overflow<br />

<strong>PVS</strong> ID: 2672 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Sylpheed, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a buffer overflow via invalid headers. Specifically, if a specially crafted email<br />

message is replied to, a buffer overflow may occur on the local machine. To exploit this, an<br />

attacker would need to be able to craft an email and entice a local user to both read and<br />

reply to the email. Successful exploitation would result in the attacker executing arbitrary<br />

code on the remote client.<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE Not available<br />

Stadtaus Form Mail < 2.4 formmail.inc.php Remote File Inclusion<br />

<strong>PVS</strong> ID: 2673 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17285<br />

Family Internet Services 684

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!