27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a remote Denial of Service (DoS)<br />

attack.\n\nThe remote server is running 4D WebStar Web Server. The remote server is<br />

reported to be vulnerable to a Denial of Service (DoS) attack via the IMAP service.<br />

Solution: Upgrade to version 5.3.5 or higher.<br />

CVE-2005-3143<br />

MailEnable STATUS Command Overflow<br />

<strong>PVS</strong> ID: 3250 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:19783<br />

Description: Synopsis :\n\nThe remote IMAP server is prone to buffer overflows.\n\nThe remote host is<br />

running a version of MailEnable's IMAP service that is prone to a buffer overflow<br />

vulnerability triggered when processing a STATUS command with a long mailbox name.<br />

Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the<br />

privileges of the affected application. In addition, the version of MailEnable is vulnerable<br />

to an IMAP directory traversal flaw. An attacker exploiting this flaw would need to be able<br />

to log into the server and issue a malformed ('../') request. Successful exploitation would<br />

result in the attacker accessing confidential data.<br />

Solution: Upgrade to MailEnable Professional 1.7 or higher or to MailEnable Enterprise Edition 1.2<br />

or higher.<br />

CVE-2005-3155<br />

UW-IMAP Quote String Buffer Overflow<br />

<strong>PVS</strong> ID: 3251 FAMILY: IMAP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe IMAP server is vulnerable to an overflow after authentication.\n\nThere<br />

is a flaw in the remote UW-IMAP server that allows an authenticated user to execute<br />

arbitrary code on the server. The flaw is in the way that UW-IMAP handles quoted mailbox<br />

names. Specifically, an attacker supplying a long mailbox name which only contained one<br />

'"' would be able to overwrite memory and execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2933<br />

PHPMyAdmin Multiple Script usesubform Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3252 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19950<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to<br />

information disclosure attacks.\n\nThe version of phpMyAdmin installed on the remote<br />

host allows attackers to read arbitrary files because of its failure to sanitize the parameter<br />

'usesubform' before using it in several scripts.<br />

Family Internet Services 836

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!