FreeBSD : unzoo -- Directory Traversal Vulnerability (5a945904-73b1-11db-91d2-0002a5c2f4ef)

Medium Nessus Plugin ID 23663


The remote FreeBSD host is missing a security-related update.


Secunia reports :

Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error when unpacking archives. This can be exploited via a directory traversal attack to overwrite files outside the directory, where the files are extracted to, if a user is tricked into extracting a malicious archive using Unzoo.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 23663

File Name: freebsd_pkg_5a94590473b111db91d20002a5c2f4ef.nasl

Version: $Revision: 1.19 $

Type: local

Published: 2006/11/20

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:unzoo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2006/11/14

Vulnerability Publication Date: 2004/10/18

Reference Information

CVE: CVE-2004-2190

BID: 11417

Secunia: 12857