FreeBSD : zip -- long path buffer overflow (40549bbf-43b5-11d9-a9e7-0001020eed82)

critical Nessus Plugin ID 18913

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

A HexView security advisory reports :

When zip performs recursive folder compression, it does not check for the length of resulting path. If the path is too long, a buffer overflow occurs leading to stack corruption and segmentation fault. It is possible to exploit this vulnerability by embedding a shellcode in directory or file name. While the issue is not of primary concern for regular users, it can be critical for environments where zip archives are re-compressed automatically using Info-Zip application.

Solution

Update the affected package.

See Also

http://www.hexview.com/docs/20041103-1.txt

http://www.nessus.org/u?3608515e

Plugin Details

Severity: Critical

ID: 18913

File Name: freebsd_pkg_40549bbf43b511d9a9e70001020eed82.nasl

Version: 1.15

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zip, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 12/1/2004

Vulnerability Publication Date: 10/3/2004

Reference Information

CVE: CVE-2004-1010

BID: 11603