FreeBSD : qpopper -- multiple privilege escalation vulnerabilities (eb29a575-3381-11da-8340-000e0c2e438a)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Jens Steube reports that qpopper is vulnerable to a privilege
escalation vulnerability. qpopper does not properly drop root
privileges so that user-supplied configuration and trace files can be
processed with root privileges. This could allow a local attacker to
create or modify arbitrary files.

qpopper is also affected by improper umask settings which could allow
users to create group or world-writeable files, possibly allowing an
attacker to overwrite arbitrary files.

See also :

http://www.nessus.org/u?b3b9d7a1

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21530 (freebsd_pkg_eb29a575338111da8340000e0c2e438a.nasl)

Bugtraq ID:

CVE ID: CVE-2005-1151
CVE-2005-1152

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now