27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3473 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21051<br />

Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail Secure<br />

Server / IMail Server, commercial messaging and collaboration suites for Windows.<br />

According to its banner, the version of Ipswitch Collaboration Suite / IMail Secure Server /<br />

IMail Server installed on the remote host has a buffer overflow issue in its IMAP server<br />

component. Using a specially-crafted FETCH command with excessive data, an<br />

authenticated attacker can crash the IMAP server on the affected host, thereby denying<br />

service to legitimate users and possibly execute arbitrary code as LOCAL SYSTEM.<br />

Solution: Upgrade to version 2006.03 or higher.<br />

CVE-2005-3526<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-002)<br />

<strong>PVS</strong> ID: 3474 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21073<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches. The remote<br />

host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-002. This security update<br />

contains fixes for the following applications<br />

:\n\napache_mod_php\nCoreTypes\nLaunchServices\nMail\nSafari\nrsync<br />

Solution: Retrieve security patch 2006-002 from Apple.<br />

CVE-2006-1220<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-002)<br />

<strong>PVS</strong> ID: 3475 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21073<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches. The remote<br />

host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-002. This security update<br />

contains fixes for the following applications<br />

:\n\napache_mod_php\nCoreTypes\nLaunchServices\nMail\nSafari\nrsync<br />

Solution: Retrieve security patch 2006-002 from Apple.<br />

CVE-2006-0399<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Simple PHP Blog < 0.4.7.2 install05.php Local File Inclusion<br />

<strong>PVS</strong> ID: 3476 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'file inclusion' flaw.\n\nThe remote<br />

host is running the Simple PHP Blog, web log (or blog) package. This version of Simple<br />

PHP Blog is vulnerable to a flaw where remote users can manipulate the application to<br />

include any local file within an executed query. For example, the attacker could request that<br />

the /etc/passwd file be used in a PHP query that would then return confidential data back to<br />

Family Internet Services 895

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!