FreeBSD : pine remotely exploitable buffer overflow in newmail.c (5789a92e-5d7f-11d8-80e3-0020ed76ef5a)

high Nessus Plugin ID 36654

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Kris Kennaway reports a remotely exploitable buffer overflow in newmail.c. Mike Silbersack submitted the fix.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?d321121f

http://www.nessus.org/u?8e43fef6

Plugin Details

Severity: High

ID: 36654

File Name: freebsd_pkg_5789a92e5d7f11d880e30020ed76ef5a.nasl

Version: 1.14

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:iw-pine, p-cpe:/a:freebsd:freebsd:pine, p-cpe:/a:freebsd:freebsd:pine4-ssl, p-cpe:/a:freebsd:freebsd:zh-pine, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/12/2004

Vulnerability Publication Date: 9/29/2000