FreeBSD : libpng stack-based buffer overflow and other code concerns (f9e3e60b-e650-11d8-9b0a-000347a4fa7d)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Chris Evans has discovered multiple vulnerabilities in libpng, which
can be exploited by malicious people to compromise a vulnerable system
or cause a DoS (Denial of Service).

See also :

http://www.securityfocus.com/archive/1/370853
http://scary.beasts.org/security/CESA-2004-001.txt
http://bugzilla.mozilla.org/show_bug.cgi?id=251381
http://www.nessus.org/u?0481eb4e
http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt
http://www.nessus.org/u?bfe92729

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 36897 (freebsd_pkg_f9e3e60be65011d89b0a000347a4fa7d.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0597
CVE-2004-0598
CVE-2004-0599

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now