Submitting forms on the support site are temporary unavailable for schedule maintenance. If you need immediate assistance please contact technical support. We apologize for the inconvenience.
Quest KACE response to FreeBSD vulnerability CVE-2023-5941
Description
This article addresses the status of the KACE Systems Management Appliance regarding FreeBSD libc stdio buffer overflow vulnerability described under CVE-2023-5941 which affects FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 . For more details about this vulnerability please refer to: CVE-2023-5941
Affected KACE SMA versions: 13.2.181
Resolution
KACE has determined that the vulnerability described under CVE-2023-5941 has a low impact on the appliance. However, KACE SMA version 13.2.182 has been released to address this vulnerability, available for download here .
Quest recommends that all customers ensure they are running a supported version of the KACE SMA.
For any questions or assistance on this topic please contact our Tech Support .
Your Request will be reviewed by our technical reviewer team and, if approved, will be added as a Topic in our Knowledgebase.
Recommended Content
Product(s):
KACE Asset Management Appliance
13.2, 13.1, 13.0
KACE Service Desk
13.2, 13.1, 13.0
KACE Systems Management Appliance
13.2, 13.1, 13.0
KACE as a Service
13.2, 13.1, 13.0
Topic(s):
Installation, Troubleshooting
Article History:
Created on: 11/28/2023 Last Update on: 12/13/2023
Thank you for your feedback for Topic Request
Your Request will be reviewed by our technical reviewer team and, if approved, will be added as a Topic in our Knowledgebase.
Welcome to Quest Support
You can find online support help for Quest *product* on an affiliate support site. Click continue to be directed to the correct support content and assistance for *product*.
Search All Articles
IE 8, 9, & 10 No longer supported
The Quest Software Portal no longer supports IE8, 9, & 10 and it is recommended to upgrade your browser to the latest version of Internet Explorer or Chrome.