FreeBSD : zope -- expose RestructuredText functionality to untrusted users (d2b80c7c-3aae-11da-9484-00123ffe8333)

High Nessus Plugin ID 21514


The remote FreeBSD host is missing one or more security-related updates.


A Zope Hotfix Alert reports :

This hotfix resolves a security issue with docutils.

Affected are possibly all Zope instances that expose RestructuredText functionalies to untrusted users through the web.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 21514

File Name: freebsd_pkg_d2b80c7c3aae11da948400123ffe8333.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2006/05/13

Modified: 2016/05/05

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zope, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/10/11

Vulnerability Publication Date: 2005/10/09

Reference Information

CVE: CVE-2005-3323

BID: 15082