CVE-2002-0315
CVSS7.5
发布时间 :2002-06-25 00:00:00
修订时间 :2016-10-17 22:18:58
NMCOS    

[原文]fasttrack p2p, as used in (1) KaZaA, (2) grokster, and (3) morpheus allows remote attackers to spoof other users by modifying the username and network information in the message header.


[CNNVD]FastTrack P2P技术信息服务存在身份欺骗漏洞(CNNVD-200206-078)

        
        KaZaA, Grokster和Morpheus是基于FastTrack P2P技术的文件共享客户端,它们运行于Microsoft Windows平台,并已经移植到Linux平台。
        用户可以通过受影响客户端的消息服务伪造一个HTTP GET头来伪装成一个已经存在的用户。不过伪造头的主机和用户名必须是合法的。
        客户端的消息服务默认在1214端口监听,即使没有任何连接到该服务。
        基于FastTrack P2P技术的文件共享客户端如果有消息功能可能都会有这个漏洞。
        这是一个安全漏洞,因为访问控制是基于客户端的身份验证。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:fasttrack:kazaa:1.3.3
cpe:/a:grokster:grokster:1.3.3
cpe:/a:fasttrack:kazaa:1.4
cpe:/a:grokster:grokster:1.3
cpe:/a:music_city_networks:morpheus:1.3.3
cpe:/a:fasttrack:kazaa:1.3
cpe:/a:music_city_networks:morpheus:1.3
cpe:/a:fasttrack:kazaa:1.5
cpe:/a:fasttrack:kazaa:1.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0315
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0315
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200206-078
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101441689224760&w=2
(UNKNOWN)  BUGTRAQ  20020222 Morpheus, Kazaa and Grokster Remote DoS. Also Identity faking vulnerability.
http://www.iss.net/security_center/static/8272.php
(VENDOR_ADVISORY)  XF  fasttrack-message-service-spoof(8272)
http://www.securityfocus.com/bid/4121
(VENDOR_ADVISORY)  BID  4121

- 漏洞信息

FastTrack P2P技术信息服务存在身份欺骗漏洞
高危 设计错误
2002-06-25 00:00:00 2005-10-20 00:00:00
远程  
        
        KaZaA, Grokster和Morpheus是基于FastTrack P2P技术的文件共享客户端,它们运行于Microsoft Windows平台,并已经移植到Linux平台。
        用户可以通过受影响客户端的消息服务伪造一个HTTP GET头来伪装成一个已经存在的用户。不过伪造头的主机和用户名必须是合法的。
        客户端的消息服务默认在1214端口监听,即使没有任何连接到该服务。
        基于FastTrack P2P技术的文件共享客户端如果有消息功能可能都会有这个漏洞。
        这是一个安全漏洞,因为访问控制是基于客户端的身份验证。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有好的临时解决方法。
        厂商补丁:
        Fast Track
        ----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.kazaa.com/

        
        http://www.grokster.com/

        
        http://www.musiccity.com/

- 漏洞信息

59555
fasttrack Crafted Message Header Remote User Spoofing
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-02-22 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

FastTrack P2P Technology Message Service Identity Spoofing Vulnerability
Design Error 4121
Yes No
2002-02-17 12:00:00 2009-07-11 10:56:00
This vulnerability was submitted to BugTraq on February 17th, 2002 by mrjade 2k2 <mrjade@softhome.net>.

- 受影响的程序版本

Music City Networks Morpheus 1.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
Music City Networks Morpheus 1.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Grokster Grokster 1.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
Grokster Grokster 1.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
FastTrack KaZaA 1.5
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
FastTrack KaZaA 1.4
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
FastTrack KaZaA 1.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
FastTrack KaZaA 1.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
FastTrack KaZaA 1.2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home

- 漏洞讨论

KaZaA, Grokster and Morpheus are file-sharing clients based on FastTrack P2P technologies. They will run on Microsoft Windows 9x/ME/NT/2000/XP systems. Ports also exist for variants of the Linux operating system.

It is possible for a user to craft a raw fake HTTP GET header to spoof the identity of an another existing user via the messaging service offered by vulnerable clients. The host and username in the header most both by valid for this to work.

Clients listen for messages on port 1214 by default, even when they are not actively connected to the service.

Any versions of file-sharing clients based on FastTrack P2P technologies which include the messaging functionality should be considered prone to this issue.

This is a security vulnerability because access control is based on client identities, supplied in the request headers.

Attackers may spoof their identity to exploit BugTraq ID 4122 "FastTrack P2P Technology Message Service Denial Of Service Vulnerability".

- 漏洞利用

The attacker must craft a raw HTTP GET request header with spoofed information to exploit this issue.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站