CVE-1999-0390
CVSS7.2
发布时间 :1999-01-04 00:00:00
修订时间 :2008-09-09 08:34:27
NMCO    

[原文]Buffer overflow in Dosemu Slang library in Linux.


[CNNVD]Dosemu S-Lang漏洞(CNNVD-199901-030)

        Linux的Dosemu Slang图书馆中存在缓冲区溢出漏洞。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:5.1Red Hat Linux 5.1
cpe:/o:redhat:linux:4.2Red Hat Linux 4.2
cpe:/o:redhat:linux:4.1Red Hat Linux 4.1
cpe:/o:redhat:linux:5.2::i386
cpe:/o:suse:suse_linux:5.1SuSE SuSE Linux 5.1
cpe:/o:redhat:linux:5.0Red Hat Linux 5.0
cpe:/o:suse:suse_linux:5.0SuSE SuSE Linux 5.0
cpe:/o:redhat:linux:4.0Red Hat Linux 4.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0390
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0390
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199901-030
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/187
(UNKNOWN)  BID  187
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-006.1.txt
(UNKNOWN)  CALDERA  CSSA-1999-006.1

- 漏洞信息

Dosemu S-Lang漏洞
高危 缓冲区溢出
1999-01-04 00:00:00 2005-05-02 00:00:00
本地  
        Linux的Dosemu Slang图书馆中存在缓冲区溢出漏洞。

- 公告与补丁

        As noted by Erik Mouw (J.A.K.Mouw@ITS.TUDELFT.NL)
        Last saturday, the Dosemu Team released Dosemu 0.99.6 which fixes the Slang hole. This is a development release, but the changes will also come in the next stable release, Dosemu 0.98.5. From the ChangeLog:
        99/01/06 ver. 0.99.5.3 unofficial pre-release From Hans - upgraded to slang-1.2.2 because of buffer overrun exploits in 1.0.3. Verified, that _both_ exploits are fixed. - fixed (now) possible buffer overrun in verror (utilities.c), because slang-1.2.2 fixed its exploit by passing the involved printout via (*SLang_Exit_Error_Hook)() to _our_ hooking routine. (well, so we now have it ;-)
        Dosemu 0.99.6 is available at: ftp://ftp.dosemu.org:/dosemu/Development/dosemu-0.99.6.tgz
        People using the 0.98 stable release should not run Dosemu suid root. Remove the s-bit from the Dosemu binary and wait for the next stable 0.98.5 release.
        There is some security related documentation for Dosemu available at
        http://www.dosemu.org/docs/README/0.98/README-3.html , although it is a bit outdated.
        Note that any Dosemu version running suid root with DPMI enabled is inherently unsafe. A DPMI program in Dosemu is able to use Linux system calls, including system calls that require root privileges. The Dosemu Team is not able to fix this security hole; system administrators who are serious about security, should not install Dosemu suid-root. Dosemu can run non-suid on the Slangterminal, under X, in the background and even on serial lines (bbs'es for example).

- 漏洞信息

927
Linux Dosemu S-Lang Multiple Variable Local Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

1999-01-04 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站