FreeBSD : hafiye -- lack of terminal escape sequence filtering (027380b7-3404-11d9-ac1b-000d614f7fad)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A siyahsapka.org advisory reads :

Hafiye-1.0 doesnt filter the payload when printing it to the terminal.
A malicious attacker can send packets with escape sequence payloads to
exploit this vulnerability.

If Hafiye has been started with -n packet count option , the
vulnerability could allow remote code execution. For remote code
execution the victim must press Enter after program exit.

Note that it appears that this bug can only be exploited in
conjunction with a terminal emulator that honors the appropriate
escape sequences.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=70978
http://www.nessus.org/u?c2a917a5
http://www.enderunix.org/hafiye/
http://www.nessus.org/u?8ca939f8

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37293 (freebsd_pkg_027380b7340411d9ac1b000d614f7fad.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now