27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 8.12.0 or higher.<br />

CVE-2006-3066<br />

Sendmail < 8.13.7 Multi-part MIME Message Handling DoS<br />

<strong>PVS</strong> ID: 3653 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its banner, the remote sendmail server is running a version less than<br />

8.13.7. There is a flaw in versions of Sendmail less than 8.13.7 that would allow a remote<br />

attacker to deny resources to legitimate users. An attacker exploiting this flaw would only<br />

need to be able to send email through the remote sendmail server.<br />

Solution: Upgrade to version 8.13.7 or higher.<br />

Calendarix <<br />

CVE-2006-1173<br />

<strong>PVS</strong> ID: 3654 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Calendarix, a calendar application for web servers. This version of Calendarix is<br />

vulnerable to a flaw in the way that it parses user-supplied HTTP data. An attacker<br />

exploiting this flaw would be able to send specially formatted SQL commands that, upon<br />

being parsed, would execute on the remote database server. This can lead to a loss of<br />

confidentiality, integrity, and availability on the remote database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

MERCUR < 2005 SP4 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 3655 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a number of Denial of Service (DoS)<br />

attacks.\n\nThe remote host is running the Atrium Software MERCUR mail server, a POP3,<br />

SMTP and IMAP server. This version of MERCUR is vulnerable to a number of flaws in<br />

the way that it handles user-supplied commands. Some of the commands do not require<br />

prior authentication. An attacker exploiting these flaws would be able to cause the<br />

MERCUR server to fail. Successful exploitation would result in the loss of availability.<br />

Solution: Upgrade to version 2005 SP4 or higher.<br />

CVE-2006-7041<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mambo < 4.6.1 Login Function usercookie Cookie SQL Injection<br />

Family Internet Services 943

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!