27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThee remote<br />

host is using Firefox.\n The remote version of this software contains various security issues<br />

that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L \n\n<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2004-0718<br />

Mozilla Browser < 1.7.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3067 FAMILY: Web Clients RISK: HIGH NESSUS ID:18813<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a multiple attack vectors.\n\nThe remote<br />

host is using Mozilla. The remote version of this software contains various security issues<br />

that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.7.10 or higher.<br />

CVE-2004-0718<br />

MailEnable IMAP STATUS Command Remote Overflow<br />

<strong>PVS</strong> ID: 3068 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:19193<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of MailEnable's IMAP service that is prone to a buffer overflow<br />

vulnerability triggered when processing a STATUS command with a long mailbox name.<br />

Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the<br />

privileges of the affected application.<br />

Solution: Upgrade to MailEnable Professional 1.6 or higher or to MailEnable Enterprise Edition 1.1<br />

or higher.<br />

CVE-2005-2278<br />

Nullsoft Winamp < 5.093 Malformed ID3v2 Tag Overflow<br />

<strong>PVS</strong> ID: 3069 FAMILY: Generic RISK: HIGH NESSUS ID:19217<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Winamp, a popular media player with support for playing MP3s, WAVs, and more.\n<br />

The installed version of Winamp suffers from a buffer overflow vulnerability when<br />

processing overly-long ID3v2 tags in an MP3 file. An attacker may be able to exploit this<br />

flaw to execute arbitrary code on the remote host.<br />

Solution: Upgrade to version 5.093 or higher.<br />

CVE-2005-2310<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 784

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!