FreeBSD : security/cfs -- buffer overflow (e55f948f-d729-11e0-abd1-0017f22d6707)

High Nessus Plugin ID 56082


The remote FreeBSD host is missing a security-related update.


Debian reports :

Zorgon found several buffer overflows in cfsd, a daemon that pushes encryption services into the Unix(tm) file system. We are not yet sure if these overflows can successfully be exploited to gain root access to the machine running the CFS daemon. However, since cfsd can easily be forced to die, a malicious user can easily perform a denial of service attack to it.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 56082

File Name: freebsd_pkg_e55f948fd72911e0abd10017f22d6707.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2011/09/06

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cfs, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/09/04

Vulnerability Publication Date: 2002/03/02

Reference Information

CVE: CVE-2002-0351

DSA: 116