FreeBSD : cscope -- buffer overflow vulnerabilities (72d8df84-ea6d-11da-8a53-00123ffe8333)

medium Nessus Plugin ID 21590

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Jason Duell reports :

Cscope contains an alarming number of buffer overflow vulnerabilities.
By a rough count, there are at least 48 places where we blindly sprintf() a file name into a fixed-length buffer of size PATHLEN without checking to see if the file's name is <= PATHLEN. We do similar things with environment variable values.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?463cf41f

http://www.nessus.org/u?9f57fd76

Plugin Details

Severity: Medium

ID: 21590

File Name: freebsd_pkg_72d8df84ea6d11da8a5300123ffe8333.nasl

Version: 1.17

Type: local

Published: 5/24/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cscope, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/23/2006

Vulnerability Publication Date: 11/11/2004

Reference Information

CVE: CVE-2004-2541

CWE: 119

Secunia: 13237