FreeBSD : FreeBSD -- link_ntoa(3) buffer overflow (0282269d-bbee-11e6-b1cf-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A specially crafted argument can trigger a static buffer overflow in
the library, with possibility to rewrite following static buffers that
belong to other library functions. Impact : Due to very limited use of
the function in the existing applications, and limited length of the
overflow, exploitation of the vulnerability does not seem feasible.
None of the utilities and daemons in the base system are known to be
vulnerable. However, careful review of third party software that may
use the function was not performed.

See also :

http://www.nessus.org/u?4ba7470b

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 95585 ()

Bugtraq ID:

CVE ID: CVE-2016-6559

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now