FreeBSD : gsoap -- remote code execution via via overflow (8745c67e-7dd1-4165-96e2-fcf9da2dc5b5)

Medium Nessus Plugin ID 101967


The remote FreeBSD host is missing a security-related update.


Senrio reports :

Genivia gSOAP is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds check user-supplied data before copying it into an insufficiently sized buffer.

A remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 101967

File Name: freebsd_pkg_8745c67e7dd1416596e2fcf9da2dc5b5.nasl

Version: $Revision: 3.4 $

Type: local

Published: 2017/07/26

Modified: 2018/02/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gsoap, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2017/07/25

Vulnerability Publication Date: 2017/07/18

Reference Information

CVE: CVE-2017-9765