FreeBSD : zlib -- buffer overflow vulnerability (837b9fb2-0595-11da-86bc-000e0c2e438a)

medium Nessus Plugin ID 21460

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Problem description A fixed-size buffer is used in the decompression of data streams. Due to erronous analysis performed when zlib was written, this buffer, which was belived to be sufficiently large to handle any possible input stream, is in fact too small. Impact A carefully constructed compressed data stream can result in zlib overwriting some data structures. This may cause applications to halt, resulting in a denial of service; or it may result in an attacker gaining elevated privileges.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?a7a8fbaf

Plugin Details

Severity: Medium

ID: 21460

File Name: freebsd_pkg_837b9fb2059511da86bc000e0c2e438a.nasl

Version: 1.12

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux_base-suse, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/5/2005

Vulnerability Publication Date: 7/27/2005

Reference Information

CVE: CVE-2005-1849

FreeBSD: SA-05:18.zlib