FreeBSD : xdm -- remote denial of service (d905b219-c1ca-11e9-8c46-0c9d925bbbc0)

medium Nessus Plugin ID 127953

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

nvd.nist.gov reports

X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the '!' character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?6052eeeb

Plugin Details

Severity: Medium

ID: 127953

File Name: freebsd_pkg_d905b219c1ca11e98c460c9d925bbbc0.nasl

Version: 1.4

Type: local

Published: 8/20/2019

Updated: 5/2/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2013-2179

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xdm, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/18/2019

Vulnerability Publication Date: 6/7/2013

Reference Information

CVE: CVE-2013-2179