FreeBSD : sircd -- remote reverse DNS buffer overflow (1374b96c-a1c2-11db-9ddc-0011098b2f36)

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

A vulnerability in sircd can be exploited by a malicious person to
compromise a vulnerable system. The vulnerability is caused by a
boundary error in the code handling reverse DNS lookups, when a user
connects to the service. If the FQDN (Fully Qualified Domain Name)
returned is excessively long, the allocated buffer is overflowed
making it possible to execute arbitrary code on the system with the
privileges of the sircd daemon.

See also :

http://www.nessus.org/u?6ac85692

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 8.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C)
CVSS Temporal Score : 7.9
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 24201 (freebsd_pkg_1374b96ca1c211db9ddc0011098b2f36.nasl)

Bugtraq ID: 6924

CVE ID: CVE-2003-1377

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now