FreeBSD : alsaplayer -- multiple vulnerabilities (9855ac8e-2aec-11db-a6e2-000e0c2e438a)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Luigi Auriemma reports three vulnerabilities within alsaplayer :

- The function which handles the HTTP connections is vulnerable to a
buffer-overflow that happens when it uses sscanf for copying the URL
in the Location's field received from the server into the redirect
buffer of only 1024 bytes declared in http_open.

- A buffer-overflow exists in the functions which add items to the
playlist when the GTK interface is used (so the other interfaces are
not affected by this problem): new_list_item and CbUpdated in

- AlsaPlayer automatically queries the CDDB server specified in its
configuration (by default when the user choices the
CDDA function for playing audio CDs. The function which queries the
server uses a buffer of 20 bytes and one of 9 for storing the category
and ID strings received from the server while the buffer which
contains this server's response is 32768 bytes long. Naturally for
exploiting this bug the attacker must have control of the freedb
server specified in the AlsaPlayer's configuration.

These vulnerabilities could allow a remote attacker to execute
arbitrary code, possibly gaining access to the system.

See also :

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.8
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 56494 ()

Bugtraq ID: 19450

CVE ID: CVE-2006-4089

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now