FreeBSD : FreeBSD -- Heap overflow vulnerability in bspatch (ce808022-8ee6-11e6-a590-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The implementation of bspatch is susceptible to integer overflows with
carefully crafted input, potentially allowing an attacker who can
control the patch file to write at arbitrary locations in the heap.
This issue was partially addressed in FreeBSD-SA-16:25.bspatch, but
some possible integer overflows remained. Impact : An attacker who can
control the patch file can cause a crash or run arbitrary code under
the credentials of the user who runs bspatch, in many cases, root.

See also :

http://www.nessus.org/u?88e1eae5

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 93943 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now