27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In addition, there is a local client flaw within the FileZilla server component. A local user<br />

on the FileZilla server who is enticed to initiate an FTP connection to a malicious server<br />

can be exploited.<br />

Solution: Upgrade to version 0.9.6 or higher.<br />

CVE-2005-0850<br />

NetWin SurgeMail < 3.0.0c2 Multiple Remote Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 2739 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17594<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running NetWin SurgeMail, a mail server application. The remote version of<br />

this software is vulnerable to multiple unspecified vulnerabilities that have been disclosed<br />

by the vendor.<br />

Solution: Upgrade to NetWin SurgeMail 3.0.0c2 or higher.<br />

CVE Not available<br />

DeleGate < 8.11.1 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2740 FAMILY: POP Server RISK: HIGH NESSUS ID:17599<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDelegate is reportedly<br />

vulnerable to a stack-based buffer overflow that may allow for the execution of arbitrary<br />

code. The details of this vulnerability are not known at this time.<br />

Solution: Upgrade to version 8.11.1 or higher.<br />

CVE-2005-0861<br />

Sun Cobalt RAQ Server Detection<br />

<strong>PVS</strong> ID: 2741 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote server is running the Sun Cobalt RaQ appliance. The web-based<br />

administrative access is enabled and functioning. An attacker can use the web interface to<br />

brute force login credentials off of the appliance.<br />

Solution: Ensure that the administrative interface is only available to internal (non-Internet)<br />

browsers.<br />

CVE Not available<br />

Endymion MailMan Detection<br />

<strong>PVS</strong> ID: 2742 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 705

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!