FreeBSD : FreeBSD -- Heap overflow vulnerability in bspatch (ce808022-8ee6-11e6-a590-14dae9d210b8)

High Nessus Plugin ID 93943


The remote FreeBSD host is missing one or more security-related updates.


The implementation of bspatch is susceptible to integer overflows with carefully crafted input, potentially allowing an attacker who can control the patch file to write at arbitrary locations in the heap.
This issue was partially addressed in FreeBSD-SA-16:25.bspatch, but some possible integer overflows remained. Impact : An attacker who can control the patch file can cause a crash or run arbitrary code under the credentials of the user who runs bspatch, in many cases, root.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 93943

File Name: freebsd_pkg_ce8080228ee611e6a59014dae9d210b8.nasl

Version: $Revision: 2.1 $

Type: local

Published: 2016/10/11

Modified: 2016/10/11

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:FreeBSD, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Patch Publication Date: 2016/10/10

Vulnerability Publication Date: 2016/10/10

Reference Information

FreeBSD: SA-16:29.bspatch