CVE-2002-0427
CVSS10.0
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:27:59
NMCOS    

[原文]Buffer overflows in fpexec in mod_frontpage before 1.6.1 may allow attackers to gain root privileges.


[CNNVD]Improved mod_frontpage远程缓冲区溢出漏洞(CNNVD-200208-065)

        
        Improved mod_frontpage是一个Apache Web服务器的模块,允许加载了此模块的Apache服务器与Frontpage客户端进行交互。
        Improved mod_frontpage实现上存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。
        这个漏洞源于fp_exec.c程序中的未经边界检查的内存拷贝操作。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:christof_pohl:improved_mod_frontpage:1.5.1
cpe:/a:christof_pohl:improved_mod_frontpage:1.5
cpe:/a:christof_pohl:improved_mod_frontpage:1.4.1
cpe:/a:christof_pohl:improved_mod_frontpage:1.3.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0427
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0427
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-065
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4251
(VENDOR_ADVISORY)  BID  4251
http://www.iss.net/security_center/static/8400.php
(VENDOR_ADVISORY)  XF  apache-modfrontpage-bo(8400)
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-021.php
(UNKNOWN)  MANDRAKE  MDKSA-2002:021
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:17.mod_frontpage.asc
(UNKNOWN)  FREEBSD  FreeBSD-SA-02:17

- 漏洞信息

Improved mod_frontpage远程缓冲区溢出漏洞
危急 边界条件错误
2002-08-12 00:00:00 2005-10-20 00:00:00
远程  
        
        Improved mod_frontpage是一个Apache Web服务器的模块,允许加载了此模块的Apache服务器与Frontpage客户端进行交互。
        Improved mod_frontpage实现上存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。
        这个漏洞源于fp_exec.c程序中的未经边界检查的内存拷贝操作。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 不要使用Improved mod_frontpage模块。
        厂商补丁:
        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2002:021)以及相应补丁:
        MDKSA-2002:021:mod_frontpage
        链接:
        http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-021.php3

        补丁下载:
        Mandrake Linux 8.0:
        0b2760b21addbe6396be4abe6be97305 8.0/RPMS/mod_frontpage-1.6.1-3.1mdk.i586.rpm
        2fb9a89afd1385ab60c894f6985284e7 8.0/SRPMS/mod_frontpage-1.6.1-3.1mdk.src.rpm
        Mandrake Linux 8.0/ppc:
        009635a52c08313eede64f30fff223f2 ppc/8.0/RPMS/mod_frontpage-1.6.1-3.1mdk.ppc.rpm
        2fb9a89afd1385ab60c894f6985284e7 ppc/8.0/SRPMS/mod_frontpage-1.6.1-3.1mdk.src.rpm
        Mandrake Linux 8.1:
        8c2baeebb796353035f8816ed6cdfbed 8.1/RPMS/mod_frontpage-1.6.1-3.1mdk.i586.rpm
        2fb9a89afd1385ab60c894f6985284e7 8.1/SRPMS/mod_frontpage-1.6.1-3.1mdk.src.rpm
        Mandrake Linux 8.1/ia64:
        9d175e164af2e6a39c2d4576e543752e ia64/8.1/RPMS/mod_frontpage-1.6.1-3.1mdk.ia64.rpm
        2fb9a89afd1385ab60c894f6985284e7 ia64/8.1/SRPMS/mod_frontpage-1.6.1-3.1mdk.src.rpm
        上述升级软件可以在下列地址中的任意一个镜像ftp服务器上下载:
        
        http://www.mandrakesecure.net/en/ftp.php

- 漏洞信息

14410
mod_frontpage for Apache HTTP Server fpexec Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

A remote overflow exists in Mod_frontpage. The product fails to sufficiently do bounds checking on memory-copy operations resulting in a buffer overflow. With a specially crafted request, an attacker can compromise the web server resulting in a loss of integrity.

- 时间线

2002-03-07 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.6.1-3.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Improved mod_frontpage Buffer Overflow Vulnerability
Boundary Condition Error 4251
Yes No
2002-03-08 12:00:00 2009-07-11 10:56:00
Credited to MandrakeSoft.

- 受影响的程序版本

Christof Pohl Improved mod_frontpage 1.5.1
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.14
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.11
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.4
- Apache Software Foundation Apache 1.3.3
- Apache Software Foundation Apache 1.3.1
- Apache Software Foundation Apache 1.3
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
Christof Pohl Improved mod_frontpage 1.5
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.14
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.11
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.4
- Apache Software Foundation Apache 1.3.3
- Apache Software Foundation Apache 1.3.1
- Apache Software Foundation Apache 1.3
Christof Pohl Improved mod_frontpage 1.4.1
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.14
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.11
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.4
- Apache Software Foundation Apache 1.3.3
- Apache Software Foundation Apache 1.3.1
- Apache Software Foundation Apache 1.3
Christof Pohl Improved mod_frontpage 1.3.2
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.14
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.11
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.4
- Apache Software Foundation Apache 1.3.3
- Apache Software Foundation Apache 1.3.1
- Apache Software Foundation Apache 1.3
Christof Pohl Improved mod_frontpage 1.3.1
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19
- Apache Software Foundation Apache 1.3.18
- Apache Software Foundation Apache 1.3.17
- Apache Software Foundation Apache 1.3.14
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.11
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.4
- Apache Software Foundation Apache 1.3.3
- Apache Software Foundation Apache 1.3.1
- Apache Software Foundation Apache 1.3
Christof Pohl Improved mod_frontpage 1.6.1

- 不受影响的程序版本

Christof Pohl Improved mod_frontpage 1.6.1

- 漏洞讨论

Improved mod_frontpage is a module for the Apache webserver that allows for enhanced webserver interaction with the Frontpage client.

Improved mod_frontpage is susceptible to a buffer overflow condition that may allow for remote attackers to compromise the webserver. The bug is reportedly present in the fp_exec.c component and is due to insufficient bounds checking on memory-copy operations.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Mandrake has released fixes:


Christof Pohl Improved mod_frontpage 1.5.1

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站