FreeBSD : privoxy -- multiple vulnerabilities (89d4ed09-c3d7-11e5-b5fe-002590263bf5)

high Nessus Plugin ID 88150

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Privoxy Developers reports :

Fixed a memory leak when rejecting client connections due to the socket limit being reached (CID 66382). This affected Privoxy 3.0.21 when compiled with IPv6 support (on most platforms this is the default).

Fixed an immediate-use-after-free bug (CID 66394) and two additional unconfirmed use-after-free complaints made by Coverity scan (CID 66391, CID 66376).

MITRE reports :

Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.

Solution

Update the affected package.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195468

http://www.privoxy.org/3.0.22/user-manual/whatsnew.html

https://www.openwall.com/lists/oss-security/2015/01/11/1

http://www.nessus.org/u?10f3c2ab

Plugin Details

Severity: High

ID: 88150

File Name: freebsd_pkg_89d4ed09c3d711e5b5fe002590263bf5.nasl

Version: 2.4

Type: local

Published: 1/26/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:privoxy, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/26/2016

Vulnerability Publication Date: 1/10/2015

Reference Information

CVE: CVE-2015-1030, CVE-2015-1031, CVE-2015-1201