This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Chris Evans discovered several vulnerabilities in the libXpm image
- A stack-based buffer overflow in xpmParseColors
- An integer overflow in xpmParseColors
- A stack-based buffer overflow in ParsePixels and ParseAndPutPixels
The X11R6.8.1 release announcement reads :
This version is purely a security release, addressing multiple integer
and stack overflows in libXpm, the X Pixmap library; all known
versions of X (both XFree86 and X.Org) are affected, so all users of X
are strongly encouraged to upgrade.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19161 (freebsd_pkg_ef253f8b072711d9b45d000c41e2cdad.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now