FreeBSD : privoxy -- multiple vulnerabilities (89d4ed09-c3d7-11e5-b5fe-002590263bf5)

High Nessus Plugin ID 88150


The remote FreeBSD host is missing a security-related update.


Privoxy Developers reports :

Fixed a memory leak when rejecting client connections due to the socket limit being reached (CID 66382). This affected Privoxy 3.0.21 when compiled with IPv6 support (on most platforms this is the default).

Fixed an immediate-use-after-free bug (CID 66394) and two additional unconfirmed use-after-free complaints made by Coverity scan (CID 66391, CID 66376).

MITRE reports :

Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 88150

File Name: freebsd_pkg_89d4ed09c3d711e5b5fe002590263bf5.nasl

Version: $Revision: 2.1 $

Type: local

Published: 2016/01/26

Modified: 2016/01/26

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:privoxy, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2016/01/26

Vulnerability Publication Date: 2015/01/10

Reference Information

CVE: CVE-2015-1030, CVE-2015-1031, CVE-2015-1201