FreeBSD : Midnight Commander buffer overflows, format string bugs, and insecure temporary file handling (106)

This script is Copyright (C) 2009-2010 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a security update

Description :

The following package needs to be updated: mc

See also :

http://www.mantisbt.org/bugs/view.php?id=9533
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING
http://www.squid-cache.org/bugs/show_bug.cgi?id=1368
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c#rev1.171
http://www.FreeBSD.org/ports/portaudit/0c6f3fde-9c51-11d8-9366-0020ed76ef5a.html

Solution :

Update the package on the remote host

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 12572 (freebsd_mc_460_10.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0232
CVE-2004-0231
CVE-2004-0226

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now