FreeBSD : Buffer overflows in XFree86 servers (3837f462-5d6b-11d8-80e3-0020ed76ef5a)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A number of buffer overflows were recently discovered in XFree86,
prompted by initial discoveries by iDEFENSE. These buffer overflows
are present in the font alias handling. An attacker with authenticated
access to a running X server may exploit these vulnerabilities to
obtain root privileges on the machine running the X server.

See also :

http://www.nessus.org/u?e8ff1873
http://www.nessus.org/u?c48e2678
http://www.nessus.org/u?7790cd89

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37616 (freebsd_pkg_3837f4625d6b11d880e30020ed76ef5a.nasl)

Bugtraq ID: 9636
9652
9655

CVE ID: CVE-2004-0083
CVE-2004-0084
CVE-2004-0106

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now