FreeBSD : proxytunnel -- format string vulnerability (50744596-368f-11d9-a9e7-0001020eed82)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A Gentoo Linux Security Advisory reports :

Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is
started in daemon mode (-a [port]), it improperly logs invalid proxy
answers to syslog.

A malicious remote server could send specially crafted invalid answers
to exploit the format string vulnerability, potentially allowing the
execution of arbitrary code on the tunnelling host with the rights of
the Proxytunnel process.

See also :

http://www.nessus.org/u?8f59573d
http://www.gentoo.org/security/en/glsa/glsa-200411-07.xml
http://www.nessus.org/u?f1234aa9

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37117 (freebsd_pkg_50744596368f11d9a9e70001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0992

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now