FreeBSD : gnomevfs -- unsafe URI handling (7884d56f-f7a1-11d8-9837-000c41e2cdad)

high Nessus Plugin ID 37096

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Alexander Larsson reports that some versions of gnome-vfs and MidnightCommander contain a number of `extfs' scripts that do not properly validate user input. If an attacker can cause her victim to process a specially crafted URI, arbitrary commands can be executed with the privileges of the victim.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?54c68f00

http://www.nessus.org/u?df643a03

https://bugzilla.redhat.com/show_bug.cgi?id=127263

http://www.nessus.org/u?e3e76e5a

Plugin Details

Severity: High

ID: 37096

File Name: freebsd_pkg_7884d56ff7a111d89837000c41e2cdad.nasl

Version: 1.18

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gnomevfs, p-cpe:/a:freebsd:freebsd:gnomevfs2, p-cpe:/a:freebsd:freebsd:mc, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 8/26/2004

Vulnerability Publication Date: 8/4/2004

Reference Information

CVE: CVE-2004-0494

BID: 10864