FreeBSD : xymon-server -- multiple vulnerabilities (1cecd5e0-c372-11e5-96d6-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

J.C. Cleaver reports :

- CVE-2016-2054: Buffer overflow in xymond handling of 'config'
command

- CVE-2016-2055: Access to possibly confidential files in the Xymon
configuration directory

- CVE-2016-2056: Shell command injection in the 'useradm' and
'chpasswd' web applications

- CVE-2016-2057: Incorrect permissions on IPC queues used by the
xymond daemon can bypass IP access filtering

- CVE-2016-2058: JavaScript injection in 'detailed status webpage' of
monitoring items; XSS vulnerability via malformed acknowledgment
messages

See also :

http://lists.xymon.com/pipermail/xymon/2016-February/042986.html
http://www.nessus.org/u?c52fc75f

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 88666 ()

Bugtraq ID:

CVE ID: CVE-2016-2054
CVE-2016-2055
CVE-2016-2056
CVE-2016-2057
CVE-2016-2058

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now