FreeBSD : portaudit -- auditfile remote code execution (6d329b64-6bbb-11e1-9166-001e4f0fb9b1)

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Michael Gmelin and Jorg Scheinert has reported a remote command
execution vulnerability in portaudit.

An attacker who can get the user to use a specially crafted audit file
will be able to run commands on the users system, with the privileges
of the user running running portaudit (often root).

The attack could e.g. happen through DNS hijacking or a man in the
middle attack.

Note that if the user has set up portaudit to run from periodic this
attack could happen without direct user interaction.

In the FreeBSD Ports Collection (bsd.port.mk) the check for vulnerable
ports at install-time directly operates on the auditfile and has the
same vulnerability as portaudit. As the Ports Collection
infrastructure does not have a version number just be sure to have a
Ports Collection new enough to contain the fix for portaudit. Note
that this is only a problem for users which has portaudit installed,
as they will not have the audit database installed or downloaded
otherwise.

See also :

http://cvsweb.FreeBSD.org/ports/ports-mgmt/portaudit/Makefile#rev1.30
http://cvsweb.FreeBSD.org/ports/Mk/bsd.port.mk#rev1.707
http://www.nessus.org/u?05e019e7

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 58314 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now