27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running SocketScanner, a security tool that inspects and blocks<br />

malicious traffic. SocketScanner is often run in conjunction with WormRadar. WormRadar<br />

is a tool that monitors worm activity and sends the information to the wormradar.com<br />

servers.<br />

Solution: Ensure that you are running the latest version of SocketScanner.<br />

CVE Not available<br />

Apache < 1.6.1 auth_ldap Module Remote Format String<br />

<strong>PVS</strong> ID: 3360 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Apache auth_ldap module, a module for authenticating remote users<br />

against an LDAP server. This version of auth_ldap is vulnerable to a format string flaw. An<br />

attacker exploiting this flaw would be able to execute arbitrary code on the remote web<br />

server.<br />

Solution: Upgrade to version 1.6.1 or higher.<br />

CVE-2006-0150<br />

Eudora Internet Mail Server < 3.2.8 NTLM Authentication Request DoS<br />

<strong>PVS</strong> ID: 3361 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Eudora Internet Mail Server (EIMS), an SMTP server for Mac OS.<br />

The installed version of EIMS is vulnerable to a remote Denial of Service (DoS). An<br />

attacker exploiting this flaw would be able to cause the remote mail server to crash,<br />

impacting the availability of the service to valid users.<br />

Solution: Upgrade to version 3.2.8 or higher.<br />

CVE-2006-0141<br />

ClamAV < 0.88.0 UPX File Processing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3362 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix and Windows systems. This<br />

version of ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious<br />

file will cause the clamav process to execute arbitrary code. While the details of the attack<br />

are currently unknown, it is rumoured that an attacker exploiting this flaw would only need<br />

to be able to craft and send a malformed email to a ClamAV server. Successful exploitation<br />

results in the server executing arbitrary code or crashing.<br />

Family Internet Services 865

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!