FreeBSD : Open DC Hub -- remote buffer overflow vulnerability (cdf14b68-3ff9-11d9-8405-00065be4b5b6)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Donato Ferrante reported an exploitable buffer overflow in this
software package. Any user that can login with 'admin' privileges can
abuse it, trough the $RedirectAll command, to execute arbitrary code.

See also :

http://marc.info/?l=bugtraq&m=110144606411674
http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml
http://www.nessus.org/u?ddcb5093

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19127 (freebsd_pkg_cdf14b683ff911d9840500065be4b5b6.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now