openSUSE Security Update : atheme (openSUSE-2016-590)

Medium Nessus Plugin ID 91207


The remote openSUSE host is missing a security update.


This update for atheme fixes the following issues :

- CVE-2016-4478: Under certain circumstances, a remote attacker could cause denial of service due to a buffer overflow in the XMLRPC response encoding code (boo#978170)

- CVE-2014-9773: Remote attacker could change Atheme's behavior by registering/dropping certain accounts/nicks (boo#978170)

The version update to 7.2.6 also contains a number of upstream fixes.


Update the affected atheme packages.

See Also

Plugin Details

Severity: Medium

ID: 91207

File Name: openSUSE-2016-590.nasl

Version: $Revision: 2.3 $

Type: local

Agent: unix

Published: 2016/05/18

Modified: 2016/10/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N


Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:atheme, p-cpe:/a:novell:opensuse:atheme-debuginfo, p-cpe:/a:novell:opensuse:atheme-debugsource, p-cpe:/a:novell:opensuse:atheme-devel, p-cpe:/a:novell:opensuse:libathemecore1, p-cpe:/a:novell:opensuse:libathemecore1-debuginfo, cpe:/o:novell:opensuse:13.2, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/05/17

Reference Information

CVE: CVE-2014-9773, CVE-2016-4478