27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of Clearswift MAILsweeper for SMTP. Clearswift<br />

MAILseeper for SMTP versions 4.3.19 and prior are reported prone to several security<br />

issues. According to the vendor, an attacker can bypass security or render the application<br />

unavailable for legitimate users.<br />

Solution: Upgrade to version 4.3.20 or higher.<br />

CVE-2006-3216<br />

GFI Languard Scanner Detection<br />

<strong>PVS</strong> ID: 3660 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running an instance of GFI Languard vulnerability<br />

scanner.<br />

Solution: Ensure that this machine is scanning in accordance with corporate policies and procedures.<br />

CVE Not available<br />

Opera < 9.01 Malformed 'HREF' DoS<br />

<strong>PVS</strong> ID: 3661 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using Opera 9.00. The version of Opera installed on the remote host contains<br />

a flaw in the way that it handles very large links. An attacker exploiting this flaw would<br />

need to be able to convince an Opera user to browse to a malicious URI. Successful<br />

exploitation would result in the browser crashing.<br />

Solution: Upgrade to version 9.01 or higher.<br />

CVE-2006-3199<br />

Opera < 9.01 Malformed JPEG Overflow<br />

<strong>PVS</strong> ID: 3662 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Opera 9.00. The version of Opera installed on the remote host contains a flaw in the<br />

way that it handles JPEG images. An attacker exploiting this flaw would need to be able to<br />

convince an Opera user to browse to a malicious URI. Successful exploitation would result<br />

in the browser crashing and possibly executing arbitrary code.<br />

Solution: Upgrade to version 9.01 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 945

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!