FreeBSD : mozilla -- POP client heap overflow (c1d97a8b-05ed-11d9-b45d-000c41e2cdad)

critical Nessus Plugin ID 37377

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

zen-parse discovered a heap buffer overflow in Mozilla's POP client implementation. A malicious POP server could exploit this vulnerability to cause Mozilla to execute arbitrary code.

Solution

Update the affected packages.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=229374

https://bugzilla.mozilla.org/show_bug.cgi?id=157644

http://www.nessus.org/u?8d8e098f

Plugin Details

Severity: Critical

ID: 37377

File Name: freebsd_pkg_c1d97a8b05ed11d9b45d000c41e2cdad.nasl

Version: 1.13

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-mozilla, p-cpe:/a:freebsd:freebsd:mozilla, p-cpe:/a:freebsd:freebsd:netscape7, p-cpe:/a:freebsd:freebsd:thunderbird, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 9/14/2004

Vulnerability Publication Date: 7/22/2004

Reference Information

CVE: CVE-2004-0757