FreeBSD : SSH.COM SFTP server -- format string vulnerability (594ad3c5-a39b-11da-926c-0800209adf0e)

medium Nessus Plugin ID 21431

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

SSH Communications Security Corp reports a format string vulnerability in their SFTP server. This vulnerability could cause a user with SCP/SFTP access only to get permission to execute also other commands.
It could also allow user A to create a special file that when accessed by user B allows user A to execute commands as user B.

Solution

Update the affected packages.

See Also

https://www.ssh.com/ssh/sftp/

http://www.frsirt.com

https://securitytracker.com/id?1015619

http://www.nessus.org/u?7d49eeca

http://www.nessus.org/u?2612ee45

Plugin Details

Severity: Medium

ID: 21431

File Name: freebsd_pkg_594ad3c5a39b11da926c0800209adf0e.nasl

Version: 1.18

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ssh2, p-cpe:/a:freebsd:freebsd:ssh2-nox11, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/4/2006

Vulnerability Publication Date: 2/13/2006

Reference Information

CVE: CVE-2006-0705

BID: 16640

Secunia: 18828