Lucene search

K
nessusThis script is Copyright (C) 2004-2010 Tenable Network Security, Inc.FREEBSD_CVS_NUMEROUS_VULNS.NASL
HistorySep 24, 2004 - 12:00 a.m.

FreeBSD : SA-04:14.cvs

2004-09-2400:00:00
This script is Copyright (C) 2004-2010 Tenable Network Security, Inc.
www.tenable.com
19

0.948 High

EPSS

Percentile

99.1%

The remote host is running a version of FreeBSD which contains a version of the ‘cvs’ utility containing several issues :

  • An insufficient input validation while processing ‘Entry’ lines
  • A double-free issue
  • An integer overflow when processing ‘Max-dotdot’ commands
  • A format string bug when processing cvs wrappers
  • A single-byte buffer overflow when processing configuration files
  • Various other integers overflows
#%NASL_MIN_LEVEL 999999

# @DEPRECATED@
# 
# This script has been deprecated by freebsd_pkg_d2102505f03d11d881b0000347a4fa7d.nasl.
#
# Disabled on 2011/10/01.

#
# (C) Tenable Network Security, Inc.
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(14812);
 script_version ("1.15");
 script_bugtraq_id(10499);
 name["english"] = "FreeBSD : SA-04:14.cvs";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of FreeBSD which contains a
version of the 'cvs' utility containing several issues :

- An insufficient input validation while processing 'Entry' lines
- A double-free issue
- An integer overflow when processing 'Max-dotdot' commands
- A format string bug when processing cvs wrappers
- A single-byte buffer overflow when processing configuration files
- Various other integers overflows" );
 script_set_attribute(attribute:"solution", value:
"http://www.vuxml.org/freebsd/d2102505-f03d-11d8-81b0-000347a4fa7d.html" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(119);


 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/24");
 script_cvs_date("Date: 2018/07/20  0:18:52");
 script_end_attributes();

 
 summary["english"] = "Check for the version of the FreeBSD";
 script_cve_id("CVE-2004-0414", "CVE-2004-0416", "CVE-2004-0417", "CVE-2004-0418", "CVE-2004-1471");
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 family["english"] = "FreeBSD Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/FreeBSD/pkg_info");
 exit(0);
}


exit(0, "This plugin has been deprecated. Refer to plugin #37427 (freebsd_pkg_d2102505f03d11d881b0000347a4fa7d.nasl) instead.");


include("freebsd_package.inc");

pkgs = get_kb_item("Host/FreeBSD/pkg_info");

package = egrep(pattern:"^cvs+ipv6", string:pkgs);
if ( package )
{
if ( pkg_cmp(pkg:package, reference:"cvs+ipv6-1.11.17") < 0 ) 
        {
        security_hole(0);
        exit(0);
        }
}



package = get_kb_item("Host/FreeBSD/release");

if ( ! package ) exit(0);


if ( egrep(pattern:"FreeBSD-5\.", string:package) )
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-5.2.1_10") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}

if ( egrep(pattern:"FreeBSD-4\.[0-8]([^0-9]|$)", string:package) )
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.8_25") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}

if ( egrep(pattern:"FreeBSD-4\.9", string:package) )
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.9_12") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}

if ( egrep(pattern:"FreeBSD-4\.10", string:package) )
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.10_3") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}