FreeBSD : bnc -- remotely exploitable buffer overflow in getnickuserhost (9be819c6-4633-11d9-a9e7-0001020eed82)

Critical Nessus Plugin ID 19048


The remote FreeBSD host is missing a security-related update.


A LSS Security Advisory reports :

There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC is processing response from IRC server.

Vulnerability can be exploited if attacker tricks user to connect to his fake IRC server that will exploit this vulnerability. If the attacker has access to BNC proxy server, this vulnerability can be used to gain shell access on machine where BNC proxy server is set.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 19048

File Name: freebsd_pkg_9be819c6463311d9a9e70001020eed82.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2005/07/13

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bnc, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/12/04

Vulnerability Publication Date: 2004/11/10

Reference Information

CVE: CVE-2004-1052