27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: No solution is known at this time.<br />

CVE-2006-1292<br />

Mercur Mailserver Remote Overflow<br />

<strong>PVS</strong> ID: 3480 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote IMAP<br />

server is running Mercur Mailserver %L.\n\nThis version of Mercur is vulnerable to a flaw<br />

where remote users can send specially crafted IMAP LOGIN and SELECT commands.<br />

Upon parsing of these commands, the Mercur Mailserver crashes, potentially executing<br />

arbitrary system code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-7041<br />

Curl < 7.15.3 TFTP URL Parsing Overflow<br />

<strong>PVS</strong> ID: 3481 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to a remote buffer overflows. An<br />

attacker would have to set up a rogue web server and entice a curl user to browse to the<br />

malicious server to exploit this vulnerability. Upon successful exploitation, the attacker<br />

would be able to execute arbitrary commands with the rights of the web server. The<br />

specific flaw occurs when processing long 'tftp://' URIs. E.g.,<br />

tftp://www.somesite.com/[512 bytes]<br />

Solution: Upgrade to version 7.15.3 or higher.<br />

CVE-2006-1061<br />

MailEnable WebMail Multiple Products Quoted Printable Mail DoS<br />

<strong>PVS</strong> ID: 3482 FAMILY: IMAP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of MailEnable's WebMail service that is prone to a remote<br />

Denial of Service (DoS) attack. Specifically, an attacker sending malformed web data can<br />

crash the service. An attacker exploiting this flaw would only need to be able to create and<br />

send a malformed email to a valid WebMail user. Successful exploitation leads to a loss of<br />

availability.<br />

Solution: Upgrade to MailEnable Professional 1.73 or higher or to MailEnable Enterprise Edition<br />

1.21 or higher.<br />

Family Internet Services 897

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!