FreeBSD : libwmf -- integer overflow vulnerability (48aab1d0-4252-11de-b67a-0030843d3802)

high Nessus Plugin ID 38800

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

infamous41md has reported a vulnerability in libwmf, which potentially can be exploited by malicious people to compromise an application using the vulnerable library.

The vulnerability is caused due to an integer overflow error when allocating memory based on a value taken directly from a WMF file without performing any checks. This can be exploited to cause a heap-based buffer overflow when a specially crafted WMF file is processed.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?533ddf0d

Plugin Details

Severity: High

ID: 38800

File Name: freebsd_pkg_48aab1d0425211deb67a0030843d3802.nasl

Version: 1.11

Type: local

Published: 5/18/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libwmf, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/16/2009

Vulnerability Publication Date: 7/3/2006

Reference Information

CVE: CVE-2006-3376

BID: 18751

Secunia: 20921