FreeBSD : bsh -- remote code execution vulnerability (9e5bbffc-d8ac-11e5-b2bd-002590263bf5)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Stian Soiland-Reyes reports :

This release fixes a remote code execution vulnerability that was
identified in BeanShell by Alvaro Munoz and Christian Schneider. The
BeanShell team would like to thank them for their help and
contributions to this fix!

An application that includes BeanShell on the classpath may be
vulnerable if another part of the application uses Java serialization
or XStream to deserialize data from an untrusted source.

A vulnerable application could be exploited for remote code execution,
including executing arbitrary shell commands.

This update fixes the vulnerability in BeanShell, but it is worth
noting that applications doing such deserialization might still be
insecure through other libraries. It is recommended that application
developers take further measures such as using a restricted class
loader when deserializing. See notes on Java serialization security
XStream security and How to secure deserialization from untrusted
input without using encryption or sealing.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207334
https://github.com/beanshell/beanshell/releases/tag/2.0b6
http://www.nessus.org/u?07f7653b

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 88877 ()

Bugtraq ID:

CVE ID: CVE-2016-2510

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now