Korean
<< Back
VID 23103
Severity 40
Port 504
Protocol TCP
Class Daemon
Detailed Description The Citadel/UX server, according to its version number, has a buffer overflow vulnerability in the select() system call. Citadel/UX is an open-source Bulletin Board Service (BBS) software for Unix platforms that supports message forums, email, chat, and instant messaging. Citadel/UX versions prior to 6.29 are vulnerable to a buffer overflow vulnerability when performing a select() system call while providing very high file descriptors. Successful exploitation will allow a remote attacker to execute arbitrary code on a vulnerable host with superuser privileges.

* Note: This check solely relied on the version number of the remote Citadel/UX server to assess this vulnerability, so this might be a False Positive.

* References:
http://securityfocus.com/archive/1/388201
http://securityfocus.com/archive/1/388325

* Platforms Affected:
Citadel Project, Citadel/UX versions prior to 6.29
Apple Computer, Inc., Mac OS 10.x
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of Citadel/UX (6.29 or later), available from the Citadel Download Web site at http://uncensored.citadel.org/citadel/download.php
Related URL (CVE)
Related URL 12344 (SecurityFocus)
Related URL (ISS)