FreeBSD : security/cfs -- buffer overflow (e55f948f-d729-11e0-abd1-0017f22d6707)

high Nessus Plugin ID 56082

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Debian reports :

Zorgon found several buffer overflows in cfsd, a daemon that pushes encryption services into the Unix(tm) file system. We are not yet sure if these overflows can successfully be exploited to gain root access to the machine running the CFS daemon. However, since cfsd can easily be forced to die, a malicious user can easily perform a denial of service attack to it.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?bee839f1

Plugin Details

Severity: High

ID: 56082

File Name: freebsd_pkg_e55f948fd72911e0abd10017f22d6707.nasl

Version: 1.8

Type: local

Published: 9/6/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cfs, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 9/4/2011

Vulnerability Publication Date: 3/2/2002

Reference Information

CVE: CVE-2002-0351

DSA: 116