FreeBSD : rt -- Session fixation vulnerability (714c1406-e4cf-11de-883a-003048590f9e)

medium Nessus Plugin ID 43094

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

A vulnerability has been reported in RT, which can be exploited by malicious people to conduct session fixation attacks. The vulnerability is caused due to an error in the handling of sessions and can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?82415143

Plugin Details

Severity: Medium

ID: 43094

File Name: freebsd_pkg_714c1406e4cf11de883a003048590f9e.nasl

Version: 1.14

Type: local

Published: 12/10/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:rt, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 12/9/2009

Vulnerability Publication Date: 12/1/2009

Reference Information

CVE: CVE-2009-3585

BID: 37162

CWE: 287