FreeBSD : gnupg -- memory corruption vulnerability (30394651-13e1-11dd-bab7-0016179b2dd5)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

A vulnerability has been reported in GnuPG, which can potentially be
exploited to compromise a vulnerable system.

The vulnerability is caused due to an error when importing keys with
duplicated IDs. This can be exploited to cause a memory corruption
when importing keys via --refresh-keys or --import.

Successful exploitation potentially allows execution of arbitrary
code, but has not been proven yet.

See also :

http://www.ocert.org/advisories/ocert-2008-1.html
https://bugs.g10code.com/gnupg/issue894
http://www.nessus.org/u?7af4696f

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 32061 (freebsd_pkg_3039465113e111ddbab70016179b2dd5.nasl)

Bugtraq ID: 28487

CVE ID: CVE-2008-1530

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now