FreeBSD : sudosh -- buffer overflow (8675efd5-e22c-11e1-a808-002354ed89bc)

high Nessus Plugin ID 61481

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

ISS reports :

sudosh2 and sudosh3 are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the replay() function. By persuading a victim to replay a specially crafted recorded sudo session, a local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?26952640

http://www.nessus.org/u?09c70c45

Plugin Details

Severity: High

ID: 61481

File Name: freebsd_pkg_8675efd5e22c11e1a808002354ed89bc.nasl

Version: 1.7

Type: local

Published: 8/10/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:sudosh2, p-cpe:/a:freebsd:freebsd:sudosh3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/9/2012

Vulnerability Publication Date: 1/17/2010

Reference Information

Secunia: 38292, 38349