FreeBSD : zip -- long path buffer overflow (40549bbf-43b5-11d9-a9e7-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A HexView security advisory reports :

When zip performs recursive folder compression, it does not check for
the length of resulting path. If the path is too long, a buffer
overflow occurs leading to stack corruption and segmentation fault. It
is possible to exploit this vulnerability by embedding a shellcode in
directory or file name. While the issue is not of primary concern for
regular users, it can be critical for environments where zip archives
are re-compressed automatically using Info-Zip application.

See also :

http://www.hexview.com/docs/20041103-1.txt
http://www.nessus.org/u?0852a597

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18913 (freebsd_pkg_40549bbf43b511d9a9e70001020eed82.nasl)

Bugtraq ID: 11603

CVE ID: CVE-2004-1010

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now