This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote messaging service has a buffer overflow vulnerability.
The remote host is running Citadel/UX, a messaging server for Unix.
The remote version of this software is vulnerable to a buffer overflow
when performing a select() system call while providing very high file
descriptors. A remote attacker may exploit this flaw to modify at
least one byte in memory. This could lead to a denial of service, or
possibly arbitrary code execution.
See also :
Upgrade to Citadel 6.29 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 16245 (citadel_select_overflow.nasl)
Bugtraq ID: 12344