FreeBSD : iodined -- authentication bypass (0981958a-f733-11e3-8276-071f1604ef8a)

High Nessus Plugin ID 76134


The remote FreeBSD host is missing a security-related update.


Erik Ekman of the iodine project reports :

The client could bypass the password check by continuing after getting error from the server and guessing the network parameters. The server would still accept the rest of the setup and also network traffic.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 76134

File Name: freebsd_pkg_0981958af73311e38276071f1604ef8a.nasl

Version: $Revision: 1.1 $

Type: local

Published: 2014/06/19

Modified: 2014/06/19

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:iodine, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/06/18

Vulnerability Publication Date: 2014/06/16