FreeBSD : libcdaudio -- remote buffer overflow and code execution (bd730827-dfe0-11dd-a765-0030843d3802)

Critical Nessus Plugin ID 35343


The remote FreeBSD host is missing a security-related update.


securityfocus reports :

The 'libcdaudio' library is prone to a remote heap code in the context of an application that uses the library. Failed attacks will cause denial-of-service conditions.

A buffer-overflow in Grip occurs when the software processes a response to a CDDB query that has more than 16 matches.

To exploit this issue, an attacker must be able to influence the response to a CDDB query, either by controlling a malicious CDDB server or through some other means. Successful exploits will allow arbitrary code to run.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 35343

File Name: freebsd_pkg_bd730827dfe011dda7650030843d3802.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2009/01/12

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libcdaudio, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/01/11

Vulnerability Publication Date: 2008/11/05

Reference Information

CVE: CVE-2005-0706, CVE-2008-5030

BID: 12770, 32122

CWE: 119