![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.10184 |
Categoría: | Gain root remotely |
Título: | Various pop3 overflows |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote POP3 server might be vulnerable to a buffer overflow bug when it is issued at least one of these commands, with a too long argument : auth user pass If confirmed, this problem might allow an attacker to execute arbitrary code on the remote system, thus giving him an interactive session on this host. Solution : If you do not use POP3, disable this service in /etc/inetd.conf and restart the inetd process. Otherwise, upgrade to a newer version. See also : http://online.securityfocus.com/archive/1/27197 Risk factor : High |
Referencia Cruzada: |
BugTraq ID: 2781 BugTraq ID: 2811 BugTraq ID: 4055 BugTraq ID: 4295 BugTraq ID: 4614 BugTraq ID: 4789 BugTraq ID: 790 BugTraq ID: 830 BugTraq ID: 894 BugTraq ID: 942 Common Vulnerability Exposure (CVE) ID: CVE-2002-0799 http://www.securityfocus.com/bid/4789 Bugtraq: 20020521 YoungZSoft CMailServer overflow, PATCH + WAREZ!@#! (Google Search) http://online.securityfocus.com/archive/1/273512 http://www.iss.net/security_center/static/9132.php Common Vulnerability Exposure (CVE) ID: CVE-1999-0822 http://www.securityfocus.com/bid/830 Bugtraq: 19991130 qpop3.0b20 and below - notes and exploit (Google Search) Bugtraq: 19991130 serious Qpopper 3.0 vulnerability (Google Search) |
Copyright | This script is Copyright (C) 1999 Renaud Deraison |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |