CVE-2001-0127
CVSS7.6
发布时间 :2001-03-12 00:00:00
修订时间 :2008-09-05 16:23:20
NMCOS    

[原文]Buffer overflow in Olivier Debon Flash plugin (not the Macromedia plugin) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long DefineSound tag.


[CNNVD]Flash Sound Write-Overflow漏洞(CNNVD-200103-029)

        Olivier Debon Flash插件(不是Macromedia插件)存在缓冲区溢出漏洞。远程攻击者借助超长DefineSound标签导致服务拒绝并且可能执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.6 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0127
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0127
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200103-029
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/451096
(UNKNOWN)  CERT-VN  VU#451096
http://www.securityfocus.com/bid/2214
(VENDOR_ADVISORY)  BID  2214
http://archives.neohapsis.com/archives/bugtraq/2001-01/0236.html
(VENDOR_ADVISORY)  BUGTRAQ  20010115 Flash plugin write-overflow

- 漏洞信息

Flash Sound Write-Overflow漏洞
高危 缓冲区溢出
2001-03-12 00:00:00 2005-10-20 00:00:00
远程  
        Olivier Debon Flash插件(不是Macromedia插件)存在缓冲区溢出漏洞。远程攻击者借助超长DefineSound标签导致服务拒绝并且可能执行任意代码。

- 公告与补丁

        Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息

6643
Olivier Debon Flash Plugin DefineSound Variable Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-01-14 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Flash Sound Write-Overflow Vulnerability
Failure to Handle Exceptional Conditions 2214
Yes No
2001-01-14 12:00:00 2009-07-11 04:46:00
This vulnerability was first announced by nealk <nealk@verinet.com> on January 14, 2001 via Bugtraq.

- 受影响的程序版本

Oliver Debon Flash 0.4.9
+ Be BeOS 5.0
+ Be BeOS 4.5
- Caldera OpenLinux Desktop 2.3
- Debian Linux 2.2
+ FreeBSD FreeBSD 5.0
+ FreeBSD FreeBSD 4.2
+ FreeBSD FreeBSD 3.5.1
+ HP HP-UX 11.11
+ HP HP-UX 11.0
+ HP HP-UX 10.20
- Mandriva Linux Mandrake 7.2
- RedHat Linux 7.0
- S.u.S.E. Linux 7.0
- SCO eDesktop 2.4

- 漏洞讨论

The Flash plugin is a browser modules designed to allow browsers to interpret ehanced content using Macromedia's Flash file format. This module by Oliver Debon is freely available and open source, designed to run on operating systems other than the Microsoft Windows platform.

A buffer overflow exists in the module that could allow potential execution of arbitrary code. The problem occurs in the handling of sound files that have been incorrectly formatted or custom crafted. The format of a flash sound file comes as [tag_14 length_of_tag sound_id flags samples data]. A write-overflow occurs when the size of the file specified in the [samples] variable is smaller than the amount of data contained in the [data] variable. Therefore, it is possible to overwrite variables on the stack beyond the total number of bytes specified in the [samples] variable, and potentially execute arbitrary code. This problem makes it possible for a user with malicious intent to arbitrarily execute code as the UID of the netscape process, and potentially gain remote access or elevated privileges. This vulnerability does not affect the Macromedia version of the flash plugin.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站