FreeBSD : lldpd -- Buffer overflow/Denial of service (2a4a112a-7c1b-11e5-bd77-0800275369e2)

critical Nessus Plugin ID 86620

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The lldpd developer Vincent Bernat reports :

A buffer overflow may allow arbitrary code execution only if hardening was disabled.

Malformed packets should not make lldpd crash. Ensure we can handle them by not using assert() in this part.

Solution

Update the affected package.

See Also

https://raw.githubusercontent.com/vincentbernat/lldpd/0.7.19/NEWS

https://www.openwall.com/lists/oss-security/2015/10/30/2

http://www.nessus.org/u?3f3ec8a6

Plugin Details

Severity: Critical

ID: 86620

File Name: freebsd_pkg_2a4a112a7c1b11e5bd770800275369e2.nasl

Version: 2.8

Type: local

Published: 10/28/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:lldpd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/26/2015

Vulnerability Publication Date: 10/4/2015

Reference Information

CVE: CVE-2015-8011, CVE-2015-8012