CVE-2000-0186
CVSS7.2
发布时间 :2000-02-28 00:00:00
修订时间 :2008-09-10 15:03:15
NMCO    

[原文]Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.


[CNNVD]多个供应商 "dump"缓冲区溢出漏洞(CNNVD-200002-081)

        Linux ext2fs backup包中转储工具存在缓冲区溢出漏洞。本地用户借助超长命令行参数可以提升特权。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:turbolinux:turbolinux:6.0.2
cpe:/o:mandrakesoft:mandrake_linux:6.1MandrakeSoft Mandrake Linux 6.1
cpe:/o:freebsd:freebsd:3.4FreeBSD 3.4
cpe:/o:turbolinux:turbolinux:4.4
cpe:/o:redhat:linux:6.1::i386
cpe:/o:redhat:linux:6.0::i386
cpe:/o:redhat:linux:5.1Red Hat Linux 5.1
cpe:/o:redhat:linux:6.2::i386
cpe:/o:redhat:linux:5.2::i386
cpe:/o:turbolinux:turbolinux:4.2
cpe:/o:mandrakesoft:mandrake_linux:7.0MandrakeSoft Mandrake Linux 7.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0186
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0186
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200002-081
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1020
(UNKNOWN)  BID  1020
http://www.redhat.com/support/errata/RHSA-2000-100.html
(UNKNOWN)  REDHAT  RHSA-2000:100

- 漏洞信息

多个供应商 "dump"缓冲区溢出漏洞
高危 缓冲区溢出
2000-02-28 00:00:00 2005-05-02 00:00:00
本地  
        Linux ext2fs backup包中转储工具存在缓冲区溢出漏洞。本地用户借助超长命令行参数可以提升特权。

- 公告与补丁

        A work-around is to remove the setuid and setgid permissions from the file.
        KimYongJun included the following patch in his post to BugTraq on February 28, 2000:
        [root@loveyou SOURCES]# diff -ru dump-0.4b13/dump/main_orig.c dump-0.4b13/dump/main.c
        --- dump-0.4b13/dump/main_orig.c Mon Feb 28 14:40:01 2000
        +++ dump-0.4b13/dump/main.c Mon Feb 28 14:40:57 2000
        @@ -273,6 +273,9 @@
         exit(X_STARTUP);
         }
         disk = *argv++;
        + if ( strlen(disk) > 255 )
        + exit(X_STARTUP);
        +
         argc--;
         if (argc >= 1) {
         (void)fprintf(stderr, "Unknown arguments to dump:");
        Fixes are available for TurboLInux at:
        ftp://ftp.turbolinux.com/pub/updates/6.0/security/dump-0.4b16-1.i386.rpm
        ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/dump-0.4b16-1.src.rpm
        Fixes are available for Connectiva Linux at:
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/i386/dump-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/i386/rmt-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/i386/dump-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/i386/rmt-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/i386/dump-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/i386/rmt-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/i386/dump-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/i386/rmt-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/dump-0.4b18-1cl.i386.rpm
        ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/rmt-0.4b18-1cl.i386.rpm

- 漏洞信息

1239
Linux ext2fs Backup Package dump Command Line Argument Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2000-02-28 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站