FreeBSD : mksh -- TTY attachment privilege escalation (86c05550-12c1-11dd-bab7-0016179b2dd5)

high Nessus Plugin ID 32067

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

The vulnerability is caused due to an error when attaching to a TTY via the -T command line switch. This can be exploited to execute arbitrary commands with the privileges of the user running mksh via characters previously written to the attached virtual console.

Solution

Update the affected package.

See Also

http://www.mirbsd.org/mksh.htm#clog

http://www.nessus.org/u?411e2727

Plugin Details

Severity: High

ID: 32067

File Name: freebsd_pkg_86c0555012c111ddbab70016179b2dd5.nasl

Version: 1.13

Type: local

Published: 4/28/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mksh, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/25/2008

Vulnerability Publication Date: 4/14/2008

Reference Information

CVE: CVE-2008-1845

Secunia: 29803