27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

unauthenticated attacker may be able to exploit this issue to view arbitrary files on the<br />

remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: No solution is known at this time.<br />

CVE-2006-1149<br />

Dropbear < 0.48 Authorization-Pending Connection Saturation DoS<br />

<strong>PVS</strong> ID: 3466 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21023<br />

Description: Synopsis :\n\nThe remote SSH server is susceptible to denial of service attacks.\n\nThe<br />

remote host is running Dropbear, a small, open-source SSH server. The version of<br />

Dropbear installed on the remote host by default has a limit of 30 connections in the<br />

authorization-pending state; subsequent connections are closed immediately. This issue can<br />

be exploited trivially by an unauthenticated attacker to deny service to legitimate users.<br />

Solution: Upgrade to version 0.48 or higher.<br />

CVE-2006-1206<br />

Mac OS X Intel Detection<br />

<strong>PVS</strong> ID: 3467 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X on the Intel platform.<br />

Solution: N/A<br />

CVE Not available<br />

PeerCast < 0.1217 procConnectArgs Function Remote Overflow<br />

<strong>PVS</strong> ID: 3468 FAMILY: Web Servers RISK: HIGH NESSUS ID:21041<br />

Description: Synopsis :\n\nThe remote web server suffers from a buffer overflow vulnerability.\n\nThe<br />

version of PeerCast installed on the remote host copies the supplied option string without<br />

limit into a finite-size buffer. An unauthenticated attacker can leverage this issue to crash<br />

the affected application and possibly to execute arbitrary code on the remote host subject to<br />

the privileges of the user running PeerCast.<br />

Solution: Upgrade to version 0.1217 or higher.<br />

CVE-2006-1148<br />

Kerio MailServer < 6.1.3 Patch 1 Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3469 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 893

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!