FreeBSD : bzip2 -- integer overflow vulnerability (0ddb57a9-da20-4e99-b048-4366092f3d31)

Medium Nessus Plugin ID 50328


The remote FreeBSD host is missing a security-related update.


Secunia reports :

A vulnerability has been reported in bzip2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

The vulnerability is caused due to an integer overflow in the 'BZ2_decompress()' function in decompress.c and can be exploited to cause a crash or potentially execute arbitrary code.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 50328

File Name: freebsd_pkg_0ddb57a9da204e99b0484366092f3d31.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2010/10/26

Modified: 2014/09/18

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bzip2, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/10/25

Vulnerability Publication Date: 2010/09/21

Reference Information

CVE: CVE-2010-0405

BID: 43331

OSVDB: 68167

FreeBSD: SA-10:08.bzip2

IAVB: 2010-B-0083

Secunia: 41452