FreeBSD : golddig -- local buffer overflow vulnerabilities (949c470e-528f-11d9-ac20-00065be4b5b6)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Two buffer overflow vulnerabilities where detected. Both issues can be
used by local users to gain group games privileges on affected
systems.

The first overflow exists in the map name handling and can be
triggered when a very long name is given to the program during
command-line execution

The second overflow exists in the username processing while writing
the players score to disk. Excessivly long usernames, set via the USER
environment variable, are stored without any length checks in a memory
buffer.

See also :

http://docs.FreeBSD.org/cgi/mid.cgi?200412021055.iB2AtweU067125
http://www.nessus.org/u?4cb341d9

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19035 (freebsd_pkg_949c470e528f11d9ac2000065be4b5b6.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0121

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now