FreeBSD : dokuwiki -- multiple vulnerabilities (450b76ee-5068-11db-a5ae-00508d6a62df)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Some vulnerabilities have been reported in DokuWiki, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Input passed to the 'w' and 'h' parameters in lib/exec/fetch.php is
not properly sanitised before being passed as resize parameters to the
'convert' application. This can be exploited to cause a DoS due to
excessive CPU and memory consumption by passing very large numbers, or
to inject arbitrary shell commands by passing specially crafted
strings to the 'w' and 'h' parameter.

Successful exploitation requires that the '$conf[imconvert]' option is
set.

See also :

http://bugs.splitbrain.org/?do=details&id=924
http://bugs.splitbrain.org/?do=details&id=926
http://www.nessus.org/u?0c44e3ad

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 22489 (freebsd_pkg_450b76ee506811dba5ae00508d6a62df.nasl)

Bugtraq ID:

CVE ID: CVE-2006-5098
CVE-2006-5099

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now