RHEL 4 : libc-client (RHSA-2005:848)

High Nessus Plugin ID 20269


The remote Red Hat host is missing one or more security updates.


Updated libc-client packages that fix a buffer overflow issue are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

C-client is a common API for accessing mailboxes.

A buffer overflow flaw was discovered in the way C-client parses user-supplied mailboxes. If an authenticated user requests a specially crafted mailbox name, it may be possible to execute arbitrary code on a server that uses C-client to access mailboxes. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2933 to this issue.

All users of libc-client should upgrade to these updated packages, which contain a backported patch that resolves this issue.


Update the affected libc-client and / or libc-client-devel packages.

See Also



Plugin Details

Severity: High

ID: 20269

File Name: redhat-RHSA-2005-848.nasl

Version: $Revision: 1.19 $

Type: local

Agent: unix

Published: 2005/12/07

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libc-client, p-cpe:/a:redhat:enterprise_linux:libc-client-devel, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/12/06

Vulnerability Publication Date: 2005/10/04

Reference Information

CVE: CVE-2005-2933

BID: 15009

OSVDB: 19856

RHSA: 2005:848