FreeBSD : iodined -- authentication bypass (0981958a-f733-11e3-8276-071f1604ef8a)

high Nessus Plugin ID 76134

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Erik Ekman of the iodine project reports :

The client could bypass the password check by continuing after getting error from the server and guessing the network parameters. The server would still accept the rest of the setup and also network traffic.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?ad163268

http://www.nessus.org/u?62736ef9

Plugin Details

Severity: High

ID: 76134

File Name: freebsd_pkg_0981958af73311e38276071f1604ef8a.nasl

Version: 1.4

Type: local

Published: 6/19/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:iodine, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/18/2014

Vulnerability Publication Date: 6/16/2014