FreeBSD : dropbear -- multiple vulnerabilities (bc19dcca-7b13-11e6-b99e-589cfc0654e1)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Matt Johnston reports :

If specific usernames including '%' symbols can be created on a system
(validated by getpwnam()) then an attacker could run arbitrary code as
root when connecting to Dropbear server.

A dbclient user who can control username or host arguments could
potentially run arbitrary code as the dbclient user. This could be a
problem if scripts or webpages pass untrusted input to the dbclient
program.

dropbearconvert import of OpenSSH keys could run arbitrary code as the
local dropbearconvert user when parsing malicious key files.

dbclient could run arbitrary code as the local dbclient user if
particular -m or -c arguments are provided. This could be an issue
where dbclient is used in scripts.

dbclient or dropbear server could expose process memory to the running
user if compiled with DEBUG_TRACE and running with -v

See also :

http://www.openwall.com/lists/oss-security/2016/09/15/2
http://www.nessus.org/u?5fa84f6c

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 93552 ()

Bugtraq ID:

CVE ID: CVE-2016-7406
CVE-2016-7407
CVE-2016-7408
CVE-2016-7409

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now