FreeBSD : SSH.COM SFTP server -- format string vulnerability (594ad3c5-a39b-11da-926c-0800209adf0e)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

SSH Communications Security Corp reports a format string vulnerability
in their SFTP server. This vulnerability could cause a user with
SCP/SFTP access only to get permission to execute also other commands.
It could also allow user A to create a special file that when accessed
by user B allows user A to execute commands as user B.

See also :

http://www.ssh.com/company/newsroom/article/715/
http://www.frsirt.com/english/advisories/2006/0554
http://securitytracker.com/id?1015619
http://xforce.iss.net/xforce/xfdb/24651
http://www.nessus.org/u?5b62b5f9

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21431 (freebsd_pkg_594ad3c5a39b11da926c0800209adf0e.nasl)

Bugtraq ID: 16640

CVE ID: CVE-2006-0705