FreeBSD : elm -- remote buffer overflow in Expires header (f66e011d-13ff-11da-af41-0004614cc33d)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Ulf Harnhammar has discovered a remotely exploitable buffer overflow
in Elm e-mail client when parsing the Expires header of an e-mail
message :

The attacker only needs to send the victim an e-mail message. When the
victim with that message in his or her inbox starts Elm or simply
views the inbox in an already started copy of Elm, the buffer overflow
will happen immediately. The overflow is stack-based, and it gives
full control over EIP, EBP and EBX. It is caused by a bad sscanf(3)
call, using a format string containing '%s' to copy from a long char
array to a shorter array.

See also :

http://www.nessus.org/u?0489f72e
http://www.nessus.org/u?46841a63

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21539 (freebsd_pkg_f66e011d13ff11daaf410004614cc33d.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now