This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Ulf Harnhammar has discovered a remotely exploitable buffer overflow
in Elm e-mail client when parsing the Expires header of an e-mail
The attacker only needs to send the victim an e-mail message. When the
victim with that message in his or her inbox starts Elm or simply
views the inbox in an already started copy of Elm, the buffer overflow
will happen immediately. The overflow is stack-based, and it gives
full control over EIP, EBP and EBX. It is caused by a bad sscanf(3)
call, using a format string containing '%s' to copy from a long char
array to a shorter array.
See also :
Update the affected package.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 21539 (freebsd_pkg_f66e011d13ff11daaf410004614cc33d.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now