FreeBSD : ecartis buffer overflows and input validation bugs (3e9be8c4-8192-11d8-9645-0020ed76ef5a)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Timo Sirainen reports multiple buffer overflows that may be triggered
while parsing messages, as well as input validation errors that could
result in disclosure of mailing list passwords.

These bugs were resolved in the August 2003 snapshot of ecartis.

See also :

http://www.securiteam.com/unixfocus/5YP0H2AAUY.html
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=57082
http://www.nessus.org/u?2fda3cde

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37227 (freebsd_pkg_3e9be8c4819211d896450020ed76ef5a.nasl)

Bugtraq ID:

CVE ID: CVE-2003-0781
CVE-2003-0782

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now