FreeBSD : FreeBSD -- bsnmpd remote denial of service vulnerability (4c96ecf2-5fd9-11e6-a6c3-14dae9d210b8)

medium Nessus Plugin ID 92897

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Problem Description :

The bsnmpd(8) daemon is prone to a stack-based buffer-overflow when it has received a specifically crafted GETBULK PDU request.

Impact :

This issue could be exploited to execute arbitrary code in the context of the service daemon, or crash the service daemon, causing a denial-of-service.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?4359e814

Plugin Details

Severity: Medium

ID: 92897

File Name: freebsd_pkg_4c96ecf25fd911e6a6c314dae9d210b8.nasl

Version: 2.4

Type: local

Published: 8/12/2016

Updated: 1/4/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freebsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 8/11/2016

Vulnerability Publication Date: 1/14/2014

Reference Information

CVE: CVE-2014-1452

BID: 64967

FreeBSD: SA-14:01.bsnmpd