FreeBSD : [email protected] remotely exploitable buffer overflow (0e154a9c-5d7a-11d8-80e3-0020ed76ef5a)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The [email protected] client contains a buffer overflow in the HTTP response
handler. A malicious, spoofed [email protected] server can exploit this buffer
overflow to cause remote code execution on the client. Exploit
programs are widely available.

See also :

http://www.nessus.org/u?760b3d2d
http://www.nessus.org/u?826f4113
http://www.nessus.org/u?de770249

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 38114 (freebsd_pkg_0e154a9c5d7a11d880e30020ed76ef5a.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now