发布时间 :1999-08-21 00:00:00
修订时间 :2008-09-10 15:04:12

[原文]pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.

[CNNVD]pbpg 1.x文静阅读许可忽略漏洞(CNNVD-199908-042)

        SuSE pbpg 1.x包的pg和pb存在漏洞。攻击者可以借助此漏洞读取任意文件。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:suse:suse_linux:6.2SuSE SuSE Linux 6.2
cpe:/o:redhat:linux:6.0Red Hat Linux 6.0

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  SUSE  19990920 Security hole in pbpg

- 漏洞信息

pbpg 1.x文静阅读许可忽略漏洞
高危 访问验证错误
1999-08-21 00:00:00 2005-10-20 00:00:00
        SuSE pbpg 1.x包的pg和pb存在漏洞。攻击者可以借助此漏洞读取任意文件。

- 公告与补丁

        S.u.S.E. has released a patched version:

- 漏洞信息

SuSE Linux pbpg Package pg Arbitrary File Access
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

The pbpg package in SuSE Linux contains a flaw that may allow a malicious user to access arbitrary files. The problem is that the 'pg' binary does not properly validate user-supplied input. It is possible that the flaw may allow a malicious user to arbitrary access any file on the system resulting in a loss of confidentiality and/or integrity.

- 时间线

1999-09-16 Unknow
1999-09-16 Unknow

- 解决方案

Upgrade to version 1.2-0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

pbpg 1.x File Read Permission Override Vulnerability
Access Validation Error 1271
Yes Yes
1999-09-21 12:00:00 2009-07-11 01:56:00

- 受影响的程序版本

Bent Bagger pbpg 1.1

- 漏洞讨论

PB and PG for Linux are programs used for download from and upload to digital satellites (Pacsats) supporting the FTL0 protocol. It is distributed with some Linux distributions. /usr/bin/pg and /usr/bin/pb can be used to read any file on the system which the user may not have permissions to read.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 解决方案

S.u.S.E. has released a patched version:

- 相关参考