RHEL 2.1 : mc (RHSA-2004:035)

High Nessus Plugin ID 12456


The remote Red Hat host is missing one or more security updates.


Updated mc packages that resolve a buffer overflow vulnerability are now available.

Midnight Commander is a visual shell much like a file manager.

A buffer overflow has been found in Midnight Commander's virtual filesystem code. Specifically, a stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c allows remote attackers to execute arbitrary code during symlink conversion.

Users of Midnight Commander should install these updated packages, which resolve this issue.


Update the affected gmc, mc and / or mcserv packages.

See Also



Plugin Details

Severity: High

ID: 12456

File Name: redhat-RHSA-2004-035.nasl

Version: $Revision: 1.20 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:gmc, p-cpe:/a:redhat:enterprise_linux:mc, p-cpe:/a:redhat:enterprise_linux:mcserv, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2004/02/03

Vulnerability Publication Date: 2003/09/24

Reference Information

CVE: CVE-2003-1023

OSVDB: 2595

RHSA: 2004:035