FreeBSD : mutt -- Remote Buffer Overflow Vulnerability (d2a43243-087b-11db-bc36-0008743bf21a)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

SecurityFocus reports :

Mutt is prone to a remote buffer-overflow vulnerability. This issue is
due to the application's failure to properly bounds-check
user-supplied input before copying it to an insufficiently sized
memory buffer.

This issue may allow remote attackers to execute arbitrary machine
code in the context of the affected application. Failed exploit
attempts will likely crash the application, denying further service to
legitimate users.

See also :

http://www.nessus.org/u?fc3f05e9
http://www.nessus.org/u?4cfa4dbc

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21790 (freebsd_pkg_d2a43243087b11dbbc360008743bf21a.nasl)

Bugtraq ID: 18642

CVE ID: CVE-2006-3242

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now