FreeBSD : mini_httpd -- buffer overflow via snprintf (84dc49b0-b267-11e5-8a5b-00262d5ed8ee)

medium Nessus Plugin ID 87698

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

ACME Updates reports :

mini_httpd 1.21 and earlier allows remote attackers to obtain sensitive information from process memory via an HTTP request with a long protocol string, which triggers an incorrect response size calculation and an out-of-bounds read.

(rene) ACME, the author, claims that the vulnerability is fixed
*after* version 1.22, released on 2015-12-28

Solution

Update the affected package.

See Also

https://cxsecurity.com/cveshow/CVE-2015-1548

http://acme.com/updates/archive/192.html

http://www.nessus.org/u?b38defc9

Plugin Details

Severity: Medium

ID: 87698

File Name: freebsd_pkg_84dc49b0b26711e58a5b00262d5ed8ee.nasl

Version: 2.3

Type: local

Published: 1/4/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mini_httpd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/3/2016

Vulnerability Publication Date: 2/10/2015

Reference Information

CVE: CVE-2015-1548