FreeBSD : zoo -- stack based buffer overflow (d9307a41-c4d7-11da-b2fb-000e0c2e438a)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Jean-Sebastien Guay-Leroux report a vulnerability within the zoo
archiver. The vulnerability which is present in the fullpath()
function (from the misc.c file) is caused by improper checking of user
supplied data. The data returned to the buffer can be up to 512 bytes,
while the buffer is created to hold 256 bytes. This could result in a
buffer overflow which could allow remote code execution.

See also :

http://www.guay-leroux.com/projects/zoo-advisory.txt
http://www.nessus.org/u?b77b675f

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21518 (freebsd_pkg_d9307a41c4d711dab2fb000e0c2e438a.nasl)

Bugtraq ID: 16790

CVE ID: CVE-2006-0855

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now