FreeBSD : zlib -- buffer overflow vulnerability (837b9fb2-0595-11da-86bc-000e0c2e438a)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Problem description A fixed-size buffer is used in the decompression
of data streams. Due to erronous analysis performed when zlib was
written, this buffer, which was belived to be sufficiently large to
handle any possible input stream, is in fact too small. Impact A
carefully constructed compressed data stream can result in zlib
overwriting some data structures. This may cause applications to halt,
resulting in a denial of service; or it may result in an attacker
gaining elevated privileges.

See also :

http://www.nessus.org/u?2e52e2e4

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21460 (freebsd_pkg_837b9fb2059511da86bc000e0c2e438a.nasl)

Bugtraq ID:

CVE ID: CVE-2005-1849

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now