FreeBSD : unzoo -- Directory Traversal Vulnerability (5a945904-73b1-11db-91d2-0002a5c2f4ef)

medium Nessus Plugin ID 23663

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error when unpacking archives. This can be exploited via a directory traversal attack to overwrite files outside the directory, where the files are extracted to, if a user is tricked into extracting a malicious archive using Unzoo.

Solution

Update the affected package.

See Also

https://securitytracker.com/id/1011673

http://www.nessus.org/u?676a9ea2

Plugin Details

Severity: Medium

ID: 23663

File Name: freebsd_pkg_5a94590473b111db91d20002a5c2f4ef.nasl

Version: 1.23

Type: local

Published: 11/20/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:unzoo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2006

Vulnerability Publication Date: 10/18/2004

Reference Information

CVE: CVE-2004-2190

BID: 11417

Secunia: 12857