FreeBSD : bzip2 -- integer overflow vulnerability (0ddb57a9-da20-4e99-b048-4366092f3d31)

medium Nessus Plugin ID 50328

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

A vulnerability has been reported in bzip2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

The vulnerability is caused due to an integer overflow in the 'BZ2_decompress()' function in decompress.c and can be exploited to cause a crash or potentially execute arbitrary code.

Solution

Update the affected package.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=151364

https://www.openwall.com/lists/oss-security/2010/09/21/4

http://www.nessus.org/u?8c323b5e

Plugin Details

Severity: Medium

ID: 50328

File Name: freebsd_pkg_0ddb57a9da204e99b0484366092f3d31.nasl

Version: 1.15

Type: local

Published: 10/26/2010

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bzip2, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 10/25/2010

Vulnerability Publication Date: 9/21/2010

Reference Information

CVE: CVE-2010-0405

BID: 43331

FreeBSD: SA-10:08.bzip2

Secunia: 41452

IAVB: 2010-B-0083