27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running the HTTPrint scanning software. HTTPrint is used to enumerate<br />

and fingerprint HTTP servers. With any scanner software, there will always be the risk of<br />

interruption of services due to scanning. As HTTPrint uses some non-standard HTTP<br />

commands, it may cause some web servers to fail. Further, if the tool is used against a<br />

non-HTTP service, it can also cause availability issues.<br />

Solution: Ensure that this software is being used in accordance with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Acunetix Web Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3298 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Acunetix Vulnerability Scanner version: \n %L \n\nEnsure<br />

that the usage of this scanner is in accordance with corporate security policy.<br />

Solution: You should ensure that such a scanner is allowed by corporate policies and guidelines.<br />

CVE Not available<br />

WorldMail IMAP Server Directory Traversal Arbitrary Spool Access<br />

<strong>PVS</strong> ID: 3299 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:20224<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow and a directory traversal<br />

flaw.\n\nThe remote host is running Eudora WorldMail, a commercial email server for<br />

Windows. This version of Worldmail is vulnerable to a remote buffer overflow due to the<br />

way that it processes commands with multiple '}' characters. An attacker exploiting this<br />

flaw would be able to execute arbitrary code on the target machine. In addition, the IMAP<br />

server bundled with the version of WorldMail installed on the remote host fails to filter<br />

directory traversal sequences from mailbox names and fails to restrict access to mailboxes<br />

within its spool area. An authenticated attacker can exploit these issues to read and manage<br />

the messages of other users on the affected application as well as move arbitrary folders on<br />

the affected system. Such attacks could result in the disclosure of sensitive information as<br />

well as affect the stability of the remote host itself.<br />

Solution: No solution is known at this time.<br />

Winmail Server <<br />

CVE-2005-3189<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3300 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Magic Winmail Server that is vulnerable to multiple flaws. These<br />

flaws include a directory traversal flaw that would allow an attacker to access confidential<br />

data, a cross-site scripting (XSS) flaw and an HTML injection flaw.<br />

Family Internet Services 850

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!