FreeBSD : jabberd -- remote buffer overflow vulnerability (553224e7-4325-11d9-a3d5-000c6e8f12ef)

high Nessus Plugin ID 18936

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Caused by improper bounds-checking of username and password in the C2S module, it is possible for an attacker to cause a remote buffer overflow. The server directly handles the userinput with SQL backend functions - malicious input may lead to buffer overflow.

Solution

Update the affected package.

See Also

https://marc.info/?l=bugtraq&m=110144303826709

http://www.nessus.org/u?be626e6e

Plugin Details

Severity: High

ID: 18936

File Name: freebsd_pkg_553224e7432511d9a3d5000c6e8f12ef.nasl

Version: 1.17

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jabberd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/30/2004

Vulnerability Publication Date: 11/24/2004