FreeBSD : dropbear -- multiple vulnerabilities (bc19dcca-7b13-11e6-b99e-589cfc0654e1)

critical Nessus Plugin ID 93552

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Matt Johnston reports :

If specific usernames including '%' symbols can be created on a system (validated by getpwnam()) then an attacker could run arbitrary code as root when connecting to Dropbear server.

A dbclient user who can control username or host arguments could potentially run arbitrary code as the dbclient user. This could be a problem if scripts or webpages pass untrusted input to the dbclient program.

dropbearconvert import of OpenSSH keys could run arbitrary code as the local dropbearconvert user when parsing malicious key files.

dbclient could run arbitrary code as the local dbclient user if particular -m or -c arguments are provided. This could be an issue where dbclient is used in scripts.

dbclient or dropbear server could expose process memory to the running user if compiled with DEBUG_TRACE and running with -v

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2016/09/15/2

http://www.nessus.org/u?002ecf86

Plugin Details

Severity: Critical

ID: 93552

File Name: freebsd_pkg_bc19dcca7b1311e6b99e589cfc0654e1.nasl

Version: 2.5

Type: local

Published: 9/16/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:dropbear, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 9/15/2016

Vulnerability Publication Date: 7/12/2016

Reference Information

CVE: CVE-2016-7406, CVE-2016-7407, CVE-2016-7408, CVE-2016-7409