FreeBSD : sylpheed -- MIME-encoded file name buffer overflow vulnerability (b1e8c810-01d0-11da-bc08-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Sylpheed is vulnerable to a buffer overflow when displaying emails
with attachments that have MIME-encoded file names. This could be used
by a remote attacker to crash sylpheed potentially allowing execution
of arbitrary code with the permissions of the user running sylpheed.

See also :

http://www.nessus.org/u?ebf8d918
http://www.nessus.org/u?5767e4ff

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19354 (freebsd_pkg_b1e8c81001d011dabc080001020eed82.nasl)

Bugtraq ID: 12934

CVE ID: CVE-2005-0926

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now