FreeBSD : plib -- stack-based buffer overflow (c72a2494-c08b-11e2-bb21-083e8ed0f47b)

medium Nessus Plugin ID 66508

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

CVE reports :

Stack-based buffer overflow in the error function in ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a crafted 3d model file that triggers a long error message, as demonstrated by a .ase file.

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2012/10/29/8

http://www.nessus.org/u?5db25888

Plugin Details

Severity: Medium

ID: 66508

File Name: freebsd_pkg_c72a2494c08b11e2bb21083e8ed0f47b.nasl

Version: 1.8

Type: local

Published: 5/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:plib, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/19/2013

Vulnerability Publication Date: 10/9/2012

Reference Information

CVE: CVE-2012-4552

BID: 55839