FreeBSD : libcdaudio -- remote buffer overflow and code execution (bd730827-dfe0-11dd-a765-0030843d3802)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

securityfocus reports :

The 'libcdaudio' library is prone to a remote heap code in the context
of an application that uses the library. Failed attacks will cause
denial-of-service conditions.

A buffer-overflow in Grip occurs when the software processes a
response to a CDDB query that has more than 16 matches.

To exploit this issue, an attacker must be able to influence the
response to a CDDB query, either by controlling a malicious CDDB
server or through some other means. Successful exploits will allow
arbitrary code to run.

See also :

http://www.nessus.org/u?ff1e0b4f

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35343 (freebsd_pkg_bd730827dfe011dda7650030843d3802.nasl)

Bugtraq ID: 12770
32122

CVE ID: CVE-2005-0706
CVE-2008-5030

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now