FreeBSD : newsfetch -- server response buffer overflow vulnerability (76e0b133-6bfd-11d9-a5df-00065be4b5b6)

High Nessus Plugin ID 18987


The remote FreeBSD host is missing a security-related update.


The newsfetch program uses the sscanf function to read information from server responses into static memory buffers. Unfortunately this is done without any proper bounds checking. As a result long server responses may cause an overflow when a newsgroup listing is requested from an NNTP server.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 18987

File Name: freebsd_pkg_76e0b1336bfd11d9a5df00065be4b5b6.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2005/07/13

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:newsfetch, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/02/01

Vulnerability Publication Date: 2005/01/18

Reference Information

CVE: CVE-2005-0132