Cygwin < 1.5.24 cygwin1.dll Crafted Filename Handling Overflow

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is prone to a
buffer overflow vulnerability.

Description :

Cygwin, a Linux-like environment for Windows, is installed on the
remote host.

The version of Cygwin installed on the remote host is affected by a
heap-based buffer overflow vulnerability involving a filename length
check. Using a filename between 233 and 239 characters, an attacker
who can create a file on the remote can leverage this issue to execute
arbitrary code on the affected host subject to the privileges under
which Cygwin operates.

See also :

http://www.securityfocus.com/archive/1/484153/30/0/threaded
http://cygwin.com/ml/cygwin-developers/2007-11/msg00001.html

Solution :

Upgrade to Cygwin 1.5.24 as that version is reportedly not affected.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 28330 (cygwin_1_5_24.nasl)

Bugtraq ID: 26557

CVE ID: CVE-2007-6181

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now