27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NNTP server fails. Successful exploitation would result in a loss of availability.<br />

Solution: Upgrade to version 1.11.3 or higher.<br />

CVE-2005-1911<br />

Gaim < 1.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3012 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source, multi-protocol instant<br />

messenger. It is reported that this version of Gaim is vulnerable to several remote flaws.<br />

Namely\n\n1) A Gaim client downloading a non-Ascii support file will crash when<br />

processing the file\n2) The Gaim MSN Messenger module, when processing a malformed<br />

message, will crash.\n\nBoth of these vulnerabilities are Denial of Service (DoS) attacks<br />

that introduce a risk to availability.<br />

Solution: Update to version 1.3.1 or higher.<br />

CVE-2005-1269<br />

Outlook Express NNTP LIST Command Remote Overflow<br />

<strong>PVS</strong> ID: 3013 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:18489<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Outlook Express. This version of Outlook Express is vulnerable to a buffer<br />

overflow when malformed NNTP responses are parsed by versions of msoe.dll prior to<br />

6.00.2800.1506. An attacker exploiting this flaw would need to host a malicious NNTP<br />

server and be able to convince a local Outlook user to connect to the NNTP server.<br />

Successful exploitation would result in arbitrary code being executed on the machine<br />

running Outlook Express.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1213<br />

Outlook Web Access with Exchange 5.5 SP4 XSS<br />

<strong>PVS</strong> ID: 3014 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18488<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

remote server is running Outlook Web Access (OWA) on Exchange %L\n\nThis version of<br />

OWA, coupled with Exchange 5.5 SP4, is reported to be vulnerable to a remote Cross-Site<br />

Scripting (XSS) flaw. An attacker exploiting this flaw would typically need to be able to<br />

convince a user to browse to a malicious URI. Successful exploitation would result in<br />

arbitrary code executing in the client browser and possible theft of confidential data (such<br />

as authentication cookies).<br />

Family Internet Services 768

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!