FreeBSD : FreeBSD -- Heap overflow vulnerability in bspatch (ce808022-8ee6-11e6-a590-14dae9d210b8)

high Nessus Plugin ID 93943

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The implementation of bspatch is susceptible to integer overflows with carefully crafted input, potentially allowing an attacker who can control the patch file to write at arbitrary locations in the heap.
This issue was partially addressed in FreeBSD-SA-16:25.bspatch, but some possible integer overflows remained. Impact : An attacker who can control the patch file can cause a crash or run arbitrary code under the credentials of the user who runs bspatch, in many cases, root.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?f9aa1e1d

Plugin Details

Severity: High

ID: 93943

File Name: freebsd_pkg_ce8080228ee611e6a59014dae9d210b8.nasl

Version: 2.3

Type: local

Published: 10/11/2016

Updated: 1/4/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freebsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/10/2016

Vulnerability Publication Date: 10/10/2016

Reference Information

FreeBSD: SA-16:29.bspatch