FreeBSD : dnsmasq -- remotely exploitable buffer overflow in release candidate (7927165a-0126-11e5-9d98-080027ef73ec)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Simon Kelley reports :

Anyone running 2.[73]rc6 or 2.[73]rc7 should be aware that there's a
remotely exploitable buffer overflow in those trees. I just tagged
2.[73]rc8, which includes the fix.

(Corrections from second URL.)

See also :

http://www.nessus.org/u?ddf545e2
http://www.nessus.org/u?e4c8b496
http://www.nessus.org/u?ec39f8e0

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 83797 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now