RHEL 3 : less (RHSA-2005:068)

High Nessus Plugin ID 16264


The remote Red Hat host is missing a security update.


An updated less package that fixes segmentation fault when viewing binary files is now available.

The less utility is a text file browser that resembles more, but has extended capabilities.

Victor Ashik discovered a heap based buffer overflow in less, caused by a patch added to the less package in Red Hat Enterprise Linux 3. An attacker could construct a carefully crafted file that could cause less to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0086 to this issue. Note that this issue only affects the version of less distributed with Red Hat Enterprise Linux 3.

Red Hat believes that the Exec-Shield technology (enabled by default since Update 3) will block attempts to remotely exploit this vulnerability on x86 architectures.

All users of the less package should upgrade to this updated package, which resolves this issue.


Update the affected less package.

See Also



Plugin Details

Severity: High

ID: 16264

File Name: redhat-RHSA-2005-068.nasl

Version: $Revision: 1.17 $

Type: local

Agent: unix

Published: 2005/01/26

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:less, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/01/26

Vulnerability Publication Date: 2005/01/26

Reference Information

CVE: CVE-2005-0086

OSVDB: 13201

RHSA: 2005:068