FreeBSD : multiple buffer overflows in xboing (e25566d5-6d3f-11d8-83a4-000a95bc6fae)

Medium Nessus Plugin ID 37706


The remote FreeBSD host is missing a security-related update.


Steve Kemp reports (in a Debian bug submission) :

Due to improper bounds checking it is possible for a malicious user to gain a shell with membership group 'games'. (The binary is installed setgid games).

Environmental variables are used without being bounds-checked in any way, from the source code :

highscore.c : /* Use the environment variable if it exists */ if ((str = getenv('XBOING_SCORE_FILE')) != NULL) strcpy(filename, str); else strcpy(filename, HIGH_SCORE_FILE);

misc.c : if ((ptr = getenv('HOME')) != NULL) (void) strcpy(dest, ptr);

Neither of these checks are boundschecked, and will allow arbitary shell code to be run.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 37706

File Name: freebsd_pkg_e25566d56d3f11d883a4000a95bc6fae.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2009/04/23

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xboing, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2004/03/05

Vulnerability Publication Date: 2003/01/01

Reference Information

CVE: CVE-2004-0149

BID: 9764