FreeBSD : newsfetch -- server response buffer overflow vulnerability (76e0b133-6bfd-11d9-a5df-00065be4b5b6)

high Nessus Plugin ID 18987

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The newsfetch program uses the sscanf function to read information from server responses into static memory buffers. Unfortunately this is done without any proper bounds checking. As a result long server responses may cause an overflow when a newsgroup listing is requested from an NNTP server.

Solution

Update the affected package.

See Also

https://people.freebsd.org/~niels/issues/newsfetch-20050119.txt

http://www.nessus.org/u?f5c9ff20

Plugin Details

Severity: High

ID: 18987

File Name: freebsd_pkg_76e0b1336bfd11d9a5df00065be4b5b6.nasl

Version: 1.16

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:newsfetch, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/1/2005

Vulnerability Publication Date: 1/18/2005

Reference Information

CVE: CVE-2005-0132