FreeBSD : bzip2 -- integer overflow vulnerability (0ddb57a9-da20-4e99-b048-4366092f3d31)

medium Nessus Plugin ID 50328

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

A vulnerability has been reported in bzip2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

The vulnerability is caused due to an integer overflow in the 'BZ2_decompress()' function in decompress.c and can be exploited to cause a crash or potentially execute arbitrary code.

Solution

Update the affected package.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=151364

https://www.openwall.com/lists/oss-security/2010/09/21/4

http://www.nessus.org/u?8c323b5e

Plugin Details

Severity: Medium

ID: 50328

File Name: freebsd_pkg_0ddb57a9da204e99b0484366092f3d31.nasl

Version: 1.15

Type: local

Published: 10/26/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bzip2, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 10/25/2010

Vulnerability Publication Date: 9/21/2010

Reference Information

CVE: CVE-2010-0405

BID: 43331

FreeBSD: SA-10:08.bzip2

IAVB: 2010-B-0083

Secunia: 41452