FreeBSD : perl, webmin, usermin -- perl format string integer wrap vulnerability (bb33981a-7ac6-11da-bf72-00123f589060)

high Nessus Plugin ID 21504

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Perl Development page reports :

Dyad Security recently released a security advisory explaining how in certain cases, a carefully crafted format string passed to sprintf can cause a buffer overflow. This buffer overflow can then be used by an attacker to execute code on the machine. This was discovered in the context of a design problem with the Webmin administration package that allowed a malicious user to pass unchecked data into sprintf.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?6f9c3013

http://www.nessus.org/u?a844180b

http://www.nessus.org/u?e5db4928

http://www.webmin.com/security.html

http://www.nessus.org/u?27165a73

Plugin Details

Severity: High

ID: 21504

File Name: freebsd_pkg_bb33981a7ac611dabf7200123f589060.nasl

Version: 1.19

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:perl, p-cpe:/a:freebsd:freebsd:usermin, p-cpe:/a:freebsd:freebsd:webmin, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/15/2006

Vulnerability Publication Date: 9/23/2005

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2005-3912, CVE-2005-3962

BID: 15629