FreeBSD : xv -- exploitable buffer overflows (211)

This script is Copyright (C) 2009-2010 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a security update

Description :

The following package needs to be updated: xv-m17n

See also :

http://scary.beasts.org/security/CESA-2004-001.txt
http://secunia.com/advisories/21732/
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
http://trac.lighttpd.net/trac/ticket/1216
http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3
http://www.mozilla.org/security/announce/2006/mfsa2006-09.html
http://www.mozilla.org/security/announce/2006/mfsa2006-10.html
http://www.mozilla.org/security/announce/2006/mfsa2006-11.html
http://www.mozilla.org/security/announce/2006/mfsa2006-12.html
http://www.mozilla.org/security/announce/2006/mfsa2006-13.html
http://www.mozilla.org/security/announce/2006/mfsa2006-44.html
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html
http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
http://www.osvdb.org/8312
http://www.osvdb.org/8313
http://www.osvdb.org/8314
http://www.osvdb.org/8315
http://www.osvdb.org/8316
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
http://www.FreeBSD.org/ports/portaudit/fffacc93-16cb-11d9-bc4a-000c41e2cdad.html

Solution :

Update the package on the remote host

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 15494 (freebsd_xv_310a_4.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now