FreeBSD : chicken -- buffer overrun in substring-index[-ci] (e7b7f2b5-177a-11e5-ad33-f8d111029e6a)

high Nessus Plugin ID 84328

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

chicken developer Moritz Heidkamp reports :

The substring-index[-ci] procedures of the data-structures unit are vulnerable to a buffer overrun attack when passed an integer greater than zero as the optional START argument.

As a work-around you can switch to SRFI 13's string-contains procedure which also returns the substring's index in case it is found.

Solution

Update the affected package.

See Also

http://lists.gnu.org/archive/html/chicken-users/2015-01/msg00048.html

http://www.nessus.org/u?bdaabb54

http://www.nessus.org/u?431c3ba5

Plugin Details

Severity: High

ID: 84328

File Name: freebsd_pkg_e7b7f2b5177a11e5ad33f8d111029e6a.nasl

Version: 2.5

Type: local

Published: 6/23/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:chicken, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/22/2015

Vulnerability Publication Date: 1/12/2015

Reference Information

CVE: CVE-2014-9651