FreeBSD : jabberd -- remote buffer overflow vulnerability (553224e7-4325-11d9-a3d5-000c6e8f12ef)

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Caused by improper bounds-checking of username and password in the C2S
module, it is possible for an attacker to cause a remote buffer
overflow. The server directly handles the userinput with SQL backend
functions - malicious input may lead to buffer overflow.

See also :

http://marc.info/?l=bugtraq&m=110144303826709
http://www.nessus.org/u?80429208

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18936 (freebsd_pkg_553224e7432511d9a3d5000c6e8f12ef.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now