FreeBSD : xloadimage -- buffer overflows in NIFF image title handling (2f0cb4bb-416d-11da-99fe-000854d03344)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Ariel Berkman reports :

Unlike most of the supported image formats in xloadimage, the NIFF
image format can store a title name of arbitrary length as part of the
image file.

When xloadimage is processing a loaded image, it is creating a new
Image object and then writing the processed image to it. At that
point, it will also copy the title from the old image to the newly
created image.

The 'zoom', 'reduce', and 'rotate' functions are using a fixed length
buffer to construct the new title name when an image processing is
done. Since the title name in a NIFF format is of varying length, and
there are insufficient buffer size validations, the buffer can be
overflowed.

See also :

http://marc.info/?l=bugtraq&m=112862493918840&w=2
http://www.nessus.org/u?c68b1972

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21409 (freebsd_pkg_2f0cb4bb416d11da99fe000854d03344.nasl)

Bugtraq ID: 15051

CVE ID: CVE-2005-3178

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now