FreeBSD : hafiye -- lack of terminal escape sequence filtering (027380b7-3404-11d9-ac1b-000d614f7fad)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A advisory reads :

Hafiye-1.0 doesnt filter the payload when printing it to the terminal.
A malicious attacker can send packets with escape sequence payloads to
exploit this vulnerability.

If Hafiye has been started with -n packet count option , the
vulnerability could allow remote code execution. For remote code
execution the victim must press Enter after program exit.

Note that it appears that this bug can only be exploited in
conjunction with a terminal emulator that honors the appropriate
escape sequences.

See also :

Solution :

Update the affected package.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37293 (freebsd_pkg_027380b7340411d9ac1b000d614f7fad.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now