FreeBSD : pine remotely exploitable buffer overflow in newmail.c (5789a92e-5d7f-11d8-80e3-0020ed76ef5a)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Kris Kennaway reports a remotely exploitable buffer overflow in
newmail.c. Mike Silbersack submitted the fix.

See also :

https://docs.freebsd.org/cgi/mid.cgi?200009290728.AAA69097
http://www.nessus.org/u?92bfe663

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 36654 (freebsd_pkg_5789a92e5d7f11d880e30020ed76ef5a.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now