FreeBSD : FreeBSD -- Heap overflow vulnerability in bspatch (ce808022-8ee6-11e6-a590-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

The implementation of bspatch is susceptible to integer overflows with
carefully crafted input, potentially allowing an attacker who can
control the patch file to write at arbitrary locations in the heap.
This issue was partially addressed in FreeBSD-SA-16:25.bspatch, but
some possible integer overflows remained. Impact : An attacker who can
control the patch file can cause a crash or run arbitrary code under
the credentials of the user who runs bspatch, in many cases, root.

See also :

Solution :

Update the affected packages.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 93943 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now