CVE-2002-0525
CVSS10.0
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:28:15
NMCOES    

[原文]Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.


[CNNVD]ISC INN多个本地格式串溢出漏洞(CNNVD-200208-194)

        
        Internet Software Consortium (ISC) Internet News (INN)是一款强大的USENET系统,包括NNTP服务器和新闻阅读服务器,可使用在大多数UNIX操作系统下,包括Linux。
        Internet News (INN)包含的inews和rnews对用户提交的输入过滤,本地攻击者可以利用这个漏洞通过格式字符串攻击方式以news进程在系统上执行任意指令。
        Internet News (INN)包含的inews和rnews某些函数对用户提交的输入缺少过滤,攻击者可以通过提交恶意格式字符串破坏内存地址,精心构建提交的格式串可以覆盖内存中任何地址,导致以news进程在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:isc:inn:2.2.1ISC INN 2.2.1
cpe:/a:isc:inn:2.2.2ISC INN 2.2.2
cpe:/a:isc:inn:2.1ISC INN 2.1
cpe:/a:isc:inn:2.0ISC INN 2.0
cpe:/a:isc:inn:2.2ISC INN 2.2
cpe:/a:isc:inn:2.2.3ISC INN 2.2.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0525
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0525
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-194
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4501
(VENDOR_ADVISORY)  BID  4501
http://www.iss.net/security_center/static/8834.php
(VENDOR_ADVISORY)  XF  inn-rnews-inews-format-string(8834)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0140.html
(UNKNOWN)  BUGTRAQ  20020411 Inn (Inter Net News) security problems

- 漏洞信息

ISC INN多个本地格式串溢出漏洞
危急 输入验证
2002-08-12 00:00:00 2005-10-20 00:00:00
本地  
        
        Internet Software Consortium (ISC) Internet News (INN)是一款强大的USENET系统,包括NNTP服务器和新闻阅读服务器,可使用在大多数UNIX操作系统下,包括Linux。
        Internet News (INN)包含的inews和rnews对用户提交的输入过滤,本地攻击者可以利用这个漏洞通过格式字符串攻击方式以news进程在系统上执行任意指令。
        Internet News (INN)包含的inews和rnews某些函数对用户提交的输入缺少过滤,攻击者可以通过提交恶意格式字符串破坏内存地址,精心构建提交的格式串可以覆盖内存中任何地址,导致以news进程在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        ISC
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        ISC Upgrade inn-2.3.3.tar.gz
        ftp://ftp.isc.org/isc/inn/inn-2.3.3.tar.gz
        SCO
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        SCO RPM inn-2.2.3-13.i386.rpm
        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-038.0/RPMS/inn-2.2.3-13.i386.rpm
        SCO RPM inn-2.2.3-13.i386.rpm
        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-038.0/RPMS/inn-2.2.3-13.i386.rpm

- 漏洞信息 (21375)

ISC INN 2.0/2.1/2.2.x Multiple Local Format String Vulnerabilties (EDBID:21375)
linux local
2002-04-11 Verified
0 Paul Starzetz
N/A [点击下载]
source: http://www.securityfocus.com/bid/4501/info

The Internet Software Consortium (ISC) Internet News (INN) project is a powerful, mature implementation of a usenet system, including a NNTP server and a newsreading server. It is available for a wide range of Unix based systems, including Linux.

Multiple vulnerabilities have been reported in two components of INN, inews and rnews. Reportedly, both are vulnerable to locally exploitable format string problems. Under some systems these binaries may be installed suid root or sgid news, allowing a local attacker to gain elevated privileges. 

http://www.exploit-db.com/sploits/21375.tar.gz		

- 漏洞信息

6873
INN inews NTTP Response Format String
Local / Remote Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2002-04-11 Unknow
2002-04-11 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ISC INN Multiple Local Format String Vulnerabilties
Input Validation Error 4501
No Yes
2002-04-11 12:00:00 2009-07-11 11:56:00
Discovered by Paul Starzetz <paul@starzetz.de>.

- 受影响的程序版本

ISC INN 2.2.3
ISC INN 2.2.2
ISC INN 2.2.1
- S.u.S.E. Linux 6.3
- S.u.S.E. Linux 6.2
- S.u.S.E. Linux 6.1 alpha
- S.u.S.E. Linux 6.1
- S.u.S.E. Linux 6.0
- S.u.S.E. Linux 5.3
ISC INN 2.2
ISC INN 2.1
ISC INN 2.0
ISC INN 2.3.3

- 不受影响的程序版本

ISC INN 2.3.3

- 漏洞讨论

The Internet Software Consortium (ISC) Internet News (INN) project is a powerful, mature implementation of a usenet system, including a NNTP server and a newsreading server. It is available for a wide range of Unix based systems, including Linux.

Multiple vulnerabilities have been reported in two components of INN, inews and rnews. Reportedly, both are vulnerable to locally exploitable format string problems. Under some systems these binaries may be installed suid root or sgid news, allowing a local attacker to gain elevated privileges.

- 漏洞利用

An exploit has been provided by Paul Starzetz &lt;paul@starzetz.de&gt;:

- 解决方案

Fixes available:


ISC INN 2.0

ISC INN 2.1

ISC INN 2.2

ISC INN 2.2.1

ISC INN 2.2.2

ISC INN 2.2.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站