FreeBSD : plib -- buffer overflow (13bf0602-c08a-11e2-bb21-083e8ed0f47b)

High Nessus Plugin ID 66507


The remote FreeBSD host is missing a security-related update.


Secunia reports :

A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to a boundary error within the 'ulSetError()' function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer.

Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the 'ulSetError()' function.

The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.

Originally reported in TORCS by Andres Gomez.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 66507

File Name: freebsd_pkg_13bf0602c08a11e2bb21083e8ed0f47b.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2013/05/20

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:plib, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/05/19

Vulnerability Publication Date: 2011/12/21

Reference Information

CVE: CVE-2011-4620