27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

authentication routine. However the SSH server must be configured to use Host-Based<br />

authentication only.<br />

Solution: Upgrade to version 5.0.1 or higher.<br />

CVE-2005-4310<br />

ColdFusion < 7.01 MX Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3330 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Macromedia ColdFusion, a web application server. This version of ColdFusion<br />

is vulnerable to a number of flaws. Some of the attacks are remote in nature; however, most<br />

of the attacks require local user access. Successful exploitation results in remote users<br />

bypassing security mechanisms or local users escalating their privileges (potentially to<br />

Administrator rights)<br />

Solution: Upgrade to ColdFusion 7.01 MX or higher.<br />

CVE-2005-4345<br />

Dropbear SSH Server < 0.47 svr_ses.childpidsize Remote Overflow<br />

<strong>PVS</strong> ID: 3331 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Dropbear SSH server that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would need to be able to log into a valid account.<br />

After logging in, the user would send a malformed request to the SSH server which would<br />

result in a buffer overflow and execution of arbitrary code.<br />

Solution: Upgrade to version 0.47 or higher .<br />

CVE-2005-4178<br />

Pegasus Email Client < 4.31 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 3332 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several remote buffer overflows.\n\nThe<br />

remote host is running the Pegasus Email client. This version of Pegasus is vulnerable to<br />

two (2) distinct remote buffer overflows. In the first instance, an attacker, convincing a<br />

Pegasus user to connect to a malicious server, can cause a buffer overflow resulting in<br />

execution of arbitrary code. In the second instance, an attacker would need to be able to<br />

convince a Pegasus user to view the email 'headers'. Successful exploitation would result in<br />

the execution of arbitrary code.<br />

Family Internet Services 859

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!