FreeBSD : libwmf -- integer overflow vulnerability (48aab1d0-4252-11de-b67a-0030843d3802)

High Nessus Plugin ID 38800


The remote FreeBSD host is missing a security-related update.


Secunia reports :

infamous41md has reported a vulnerability in libwmf, which potentially can be exploited by malicious people to compromise an application using the vulnerable library.

The vulnerability is caused due to an integer overflow error when allocating memory based on a value taken directly from a WMF file without performing any checks. This can be exploited to cause a heap-based buffer overflow when a specially crafted WMF file is processed.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 38800

File Name: freebsd_pkg_48aab1d0425211deb67a0030843d3802.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2009/05/18

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libwmf, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/05/16

Vulnerability Publication Date: 2006/07/03

Reference Information

CVE: CVE-2006-3376

BID: 18751

Secunia: 20921