FreeBSD : nut -- upsd can be remotely crashed (47f13540-c4cb-4971-8dc6-28d0dabfd9cd)

high Nessus Plugin ID 59313

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Networkupstools project reports :

NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to crashes when receiving random data from the network.

This issue is related to the way NUT parses characters, especially from the network. Non printable characters were missed from strings operation (such as strlen), but still copied to the buffer, causing an overflow.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?681fd2a1

http://www.nessus.org/u?61089958

http://www.nessus.org/u?8678eb00

Plugin Details

Severity: High

ID: 59313

File Name: freebsd_pkg_47f13540c4cb49718dc628d0dabfd9cd.nasl

Version: 1.10

Type: local

Published: 5/31/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:nut, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/30/2012

Vulnerability Publication Date: 5/30/2012

Reference Information

CVE: CVE-2012-2944