FreeBSD : multiple buffer overflows in xboing (e25566d5-6d3f-11d8-83a4-000a95bc6fae)

medium Nessus Plugin ID 37706

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Steve Kemp reports (in a Debian bug submission) :

Due to improper bounds checking it is possible for a malicious user to gain a shell with membership group 'games'. (The binary is installed setgid games).

Environmental variables are used without being bounds-checked in any way, from the source code :

highscore.c : /* Use the environment variable if it exists */ if ((str = getenv('XBOING_SCORE_FILE')) != NULL) strcpy(filename, str); else strcpy(filename, HIGH_SCORE_FILE);

misc.c : if ((ptr = getenv('HOME')) != NULL) (void) strcpy(dest, ptr);

Neither of these checks are boundschecked, and will allow arbitary shell code to be run.

Solution

Update the affected package.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174924

http://www.nessus.org/u?39dd42f8

Plugin Details

Severity: Medium

ID: 37706

File Name: freebsd_pkg_e25566d56d3f11d883a4000a95bc6fae.nasl

Version: 1.14

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xboing, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/5/2004

Vulnerability Publication Date: 1/1/2003

Reference Information

CVE: CVE-2004-0149

BID: 9764