FreeBSD : newspost -- server response buffer overflow vulnerability (7f13607b-6948-11d9-8937-00065be4b5b6)

High Nessus Plugin ID 19001


The remote FreeBSD host is missing a security-related update.


The newspost program uses a function named socket_getline to read server responses from the network socket. Unfortunately this function does not check the length of the buffer in which the read data is stored and only stops reading when a newline character is found.

A malicious NNTP server could use this bug to cause a buffer overflow by sending an overly long response. Such an overflow allows arbitrary code to be executed, with the privileges of the newspost process, on the affected systems.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 19001

File Name: freebsd_pkg_7f13607b694811d9893700065be4b5b6.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2005/07/13

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:newspost, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/02/01

Vulnerability Publication Date: 2005/01/14

Reference Information

CVE: CVE-2005-0101