FreeBSD : FreeBSD -- routed(8) remote denial of service vulnerability (0d584493-600a-11e6-a6c3-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The input path in routed(8) will accept queries from any source and
attempt to answer them. However, the output path assumes that the
destination address for the response is on a directly connected
network. Impact : Upon receipt of a query from a source which is not
on a directly connected network, routed(8) will trigger an assertion
and terminate. The affected system's routing table will no longer be
updated. If the affected system is a router, its routes will
eventually expire from other routers' routing tables, and its networks
will no longer be reachable unless they are also connected to another
router.

See also :

http://www.nessus.org/u?3c01f4dd

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 92893 ()

Bugtraq ID:

CVE ID: CVE-2015-5674

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now