FreeBSD : libcdaudio -- remote buffer overflow and code execution (bd730827-dfe0-11dd-a765-0030843d3802)

critical Nessus Plugin ID 35343

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

securityfocus reports :

The 'libcdaudio' library is prone to a remote heap code in the context of an application that uses the library. Failed attacks will cause denial-of-service conditions.

A buffer-overflow in Grip occurs when the software processes a response to a CDDB query that has more than 16 matches.

To exploit this issue, an attacker must be able to influence the response to a CDDB query, either by controlling a malicious CDDB server or through some other means. Successful exploits will allow arbitrary code to run.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?008f01c8

Plugin Details

Severity: Critical

ID: 35343

File Name: freebsd_pkg_bd730827dfe011dda7650030843d3802.nasl

Version: 1.15

Type: local

Published: 1/12/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libcdaudio, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 1/11/2009

Vulnerability Publication Date: 11/5/2008

Reference Information

CVE: CVE-2005-0706, CVE-2008-5030

BID: 12770, 32122

CWE: 119