FreeBSD : LibYAML input sanitization errors (580cc46b-bb1e-11e3-b144-2c4138874f7d)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

oCERT reports :

The LibYAML project is an open source YAML 1.1 parser and emitter
written in C.

The library is affected by a heap-based buffer overflow which can lead
to arbitrary code execution. The vulnerability is caused by lack of
proper expansion for the string passed to the
yaml_parser_scan_uri_escapes() function.

A specially crafted YAML file, with a long sequence of percent-encoded
characters in a URL, can be used to trigger the overflow.

See also :

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
http://www.nessus.org/u?27dc976a

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 73321 ()

Bugtraq ID:

CVE ID: CVE-2014-2525

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now