FreeBSD : FreeBSD -- routed(8) remote denial of service vulnerability (734233f4-6007-11e6-a6c3-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The input path in routed(8) will accept queries from any source and
attempt to answer them. However, the output path assumes that the
destination address for the response is on a directly connected
network. Impact : Upon receipt of a query from a source which is not
on a directly connected network, routed(8) will trigger an assertion
and terminate. The affected system's routing table will no longer be
updated. If the affected system is a router, its routes will
eventually expire from other routers' routing tables, and its networks
will no longer be reachable unless they are also connected to another
router.

See also :

http://www.nessus.org/u?13a67bcd

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 92909 ()

Bugtraq ID: 70693

CVE ID: CVE-2014-3955

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now