FreeBSD : james -- multiple vulnerabilities (be3069c9-67e7-11e5-9909-002590263bf5)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Apache James Project reports :

This release has many enhancements and bug fixes over the previous
release. See the Release Notes for a detailed list of changes. Some of
the earlier defects could turn a James mail server into an Open Relay
and allow files to be written on disk. All users of James Server are
urged to upgrade to version v2.3.2.1 as soon as possible.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203461
http://james.apache.org/download.cgi#Apache_James_Server
https://blogs.apache.org/james/entry/apache_james_server_2_3
http://www.nessus.org/u?6eb324be

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 86214 ()

Bugtraq ID:

CVE ID: CVE-2015-7611

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now