FreeBSD : Xymon -- buffer overrun (1c7cfd05-aaee-11e4-83b4-14dae9d210b8)

critical Nessus Plugin ID 81134

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Debian reports :

web/acknowledge.c uses a string twice in a format string, but only allocates memory for one copy.

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2015/01/31/4

https://security-tracker.debian.org/tracker/CVE-2015-1430

http://www.nessus.org/u?d7bf357d

Plugin Details

Severity: Critical

ID: 81134

File Name: freebsd_pkg_1c7cfd05aaee11e483b414dae9d210b8.nasl

Version: 1.7

Type: local

Published: 2/3/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xymon-server, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/2/2015

Vulnerability Publication Date: 9/28/2014

Reference Information

CVE: CVE-2015-1430