27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

queries, possibly revealing sensitive information, launching attacks against the underlying<br />

database, and the like.<br />

Solution: Upgrade to version 1.3.0 or higher.<br />

CVE-2005-2383<br />

Alt-N MDaemon < 8.0.4 IMAP Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 3105 FAMILY: Web Servers RISK: HIGH NESSUS ID:19252<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for the Windows operating system family.<br />

It is reported that versions up to and including 8.0.3 are prone to multiple buffer overflow<br />

vulnerabilities. An attacker may cause a denial of service or execute arbitrary code on the<br />

remote server. The attacker does not need credentials to exploit the flaw in<br />

CRAM-MD5/LOGIN authenticate method.<br />

Solution: Upgrade to version 8.0.4 or higher.<br />

CVE Not available<br />

GoodTech SMTP Server < 5.17 'RCPT TO' Command Remote Overflow<br />

<strong>PVS</strong> ID: 3106 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the GoodTech SMTP server. This version of GoodTech is vulnerable to a remote<br />

buffer overflow. An attacker exploiting this flaw would send a malformed 'RCPT TO'<br />

request to the SMTP server. Successful exploitation would result in the attacker running<br />

arbitrary code on the remote system.<br />

Solution: Upgrade to version 5.17 or higher.<br />

IRC Server Detection<br />

CVE-2005-2387<br />

<strong>PVS</strong> ID: 3107 FAMILY: IRC Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an IRC server.<br />

Solution: Ensure that such services are authorized for your network<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.86.2 Content-parsing Multiple Overflows<br />

<strong>PVS</strong> ID: 3108 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 792

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!