FreeBSD : p5-UI-Dialog -- shell command execution vulnerability (00dadbf0-6f61-11e5-a2a1-002590263bf5)

High Nessus Plugin ID 86334


The remote FreeBSD host is missing a security-related update.


Matthijs Kooijman reports :

It seems that the whiptail, cdialog and kdialog backends apply some improper escaping in their shell commands, causing special characters present in menu item titles to be interpreted by the shell. This includes the backtick evaluation operator, so this constitutes a security issue, allowing execution of arbitrary commands if an attacker has control over the text displayed in a menu.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 86334

File Name: freebsd_pkg_00dadbf06f6111e5a2a1002590263bf5.nasl

Version: $Revision: 2.4 $

Type: local

Published: 2015/10/12

Modified: 2018/01/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:p5-UI-Dialog, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/10/10

Vulnerability Publication Date: 2008/08/24

Reference Information

CVE: CVE-2008-7315