FreeBSD : pine remotely exploitable buffer overflow in newmail.c (148)

This script is Copyright (C) 2009-2010 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a security update

Description :

The following package needs to be updated: iw-pine

See also :

http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147
http://secunia.com/advisories/9096
http://www.freebsd.org/cgi/cvsweb.cgi/ports/mail/pine4/Makefile?rev=1.43&content-type=text/x-cvsweb-markup
http://www.gnu.org/software/gnats/gnats.html
http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
http://www.osvdb.org/2190
http://www.phpmyadmin.net/home_page/security/PMASA-2008-10.php
http://www.securiteam.com/unixfocus/5CP0N0UAAA.html
http://x82.inetcop.org/h0me/adv1sor1es/INCSA.2003-0x82-018-GNATS-bt.txt
http://www.FreeBSD.org/ports/portaudit/5789a92e-5d7f-11d8-80e3-0020ed76ef5a.html

Solution :

Update the package on the remote host

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 12599 (freebsd_pine_421.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now