CVE-2002-0722
CVSS7.5
发布时间 :2002-09-24 00:00:00
修订时间 :2016-10-17 22:21:50
NMCO    

[原文]Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."


[CNNVD]HP Tru64 UNIX多个远程和本地缓冲区溢出漏洞(CNNVD-200209-038)

        
        Tru64 UNIX是一款由HP公司开发和维护的商业性质Unix操作系统。
        Tru64 UNIX中的多个程序存在本地和远程缓冲区溢出,攻击者可以利用这些漏洞进行拒绝服务攻击或者进行权限提升。
        SSRT2229公告中指出/usr/sbin/ping程序存在漏洞,可导致拒绝服务攻击,不过这个漏洞应该是相关本地安全。
        SSRT2275公告中指出多个二进制程序存在本地和远程缓冲区溢出,非特权用户可以进行未授权权限访问。这些有漏洞的程序如下所示:
         基本命令和工具(危险程度 - 高)
         SSRT2277 /usr/bin/ypmatch
         SSRT2261 /usr/sbin/traceroute
         SSRT2260 /usr/sbin/lpc
         /usr/bin/lprm
         /usr/bin/lpq
         /usr/bin/lpr
         /usr/lbin/lpd
         SSRT0796U /usr/bin/binmail
         SSRT0794U /usr/bin/ipcs
         SSRT2191 /usr/sbin/quot
         SSRT2189 /usb/bin/at
         SSRT2256 /usr/bin/ps
         SSRT2275 /usr/bin/uux
         /usr/bin/uucp
         /usr/bin/csh
         /usr/bin/rdist
         /usr/bin/mh/inc
         /usr/bin/mh/msgchk
         /usr/sbin/imapd
         /usr/bin/deliver
         /sbin/.upd..loader
         CDE (危险程度 - 高)
         SSRT2193 /usr/dt/bin/mailcv
         SSRT2280 /usr/dt/bin/dtterm
         SSRT2282 /usr/dt/bin/dtsession
         SSRT2274 /usr/dt/bin/rpc.ttdbserverd
         SSRT2251
         X11 (危险程度 - 高)
         SSRT2279 /usr/bin/X11/dxterm
         SSRT2275 /usr/bin/X11/dxconsole
         /usr/bin/X11/dxpause
         /usr/bin/X11/dxsysinfo
         Networking (危险程度 - 高)
         SSRT2340 /usr/sbin/telnetd
         SSRT2270 BIND resolver glibc
         SSRT2309 rpc XDR_ARRAY
        目前还没有具体技术细节。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:6.0Microsoft Internet Explorer 6.0
cpe:/a:microsoft:ie:5.01Microsoft Internet Explorer 5.01
cpe:/a:microsoft:ie:5.5Microsoft ie 5.5
cpe:/a:microsoft:ie:5.5:sp2Microsoft Internet Explorer 5.5 SP2
cpe:/a:microsoft:ie:5.5:sp1Microsoft Internet Explorer 5.5 SP1
cpe:/a:microsoft:ie:5.01:sp2Microsoft Internet Explorer 5.01 SP2
cpe:/a:microsoft:ie:5.01:sp1Microsoft Internet Explorer 5.01 SP1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0722
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0722
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200209-038
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=103054692223380&w=2
(UNKNOWN)  BUGTRAQ  20020828 Origin of downloaded files can be spoofed in MSIE
http://www.iss.net/security_center/static/9937.php
(UNKNOWN)  XF  ie-file-origin-spoofing(9937)
http://www.microsoft.com/technet/security/bulletin/ms02-047.asp
(VENDOR_ADVISORY)  MS  MS02-047
http://www.securityfocus.com/bid/5559
(UNKNOWN)  BID  5559

- 漏洞信息

HP Tru64 UNIX多个远程和本地缓冲区溢出漏洞
高危 其他
2002-09-24 00:00:00 2005-10-12 00:00:00
远程  
        
        Tru64 UNIX是一款由HP公司开发和维护的商业性质Unix操作系统。
        Tru64 UNIX中的多个程序存在本地和远程缓冲区溢出,攻击者可以利用这些漏洞进行拒绝服务攻击或者进行权限提升。
        SSRT2229公告中指出/usr/sbin/ping程序存在漏洞,可导致拒绝服务攻击,不过这个漏洞应该是相关本地安全。
        SSRT2275公告中指出多个二进制程序存在本地和远程缓冲区溢出,非特权用户可以进行未授权权限访问。这些有漏洞的程序如下所示:
         基本命令和工具(危险程度 - 高)
         SSRT2277 /usr/bin/ypmatch
         SSRT2261 /usr/sbin/traceroute
         SSRT2260 /usr/sbin/lpc
         /usr/bin/lprm
         /usr/bin/lpq
         /usr/bin/lpr
         /usr/lbin/lpd
         SSRT0796U /usr/bin/binmail
         SSRT0794U /usr/bin/ipcs
         SSRT2191 /usr/sbin/quot
         SSRT2189 /usb/bin/at
         SSRT2256 /usr/bin/ps
         SSRT2275 /usr/bin/uux
         /usr/bin/uucp
         /usr/bin/csh
         /usr/bin/rdist
         /usr/bin/mh/inc
         /usr/bin/mh/msgchk
         /usr/sbin/imapd
         /usr/bin/deliver
         /sbin/.upd..loader
         CDE (危险程度 - 高)
         SSRT2193 /usr/dt/bin/mailcv
         SSRT2280 /usr/dt/bin/dtterm
         SSRT2282 /usr/dt/bin/dtsession
         SSRT2274 /usr/dt/bin/rpc.ttdbserverd
         SSRT2251
         X11 (危险程度 - 高)
         SSRT2279 /usr/bin/X11/dxterm
         SSRT2275 /usr/bin/X11/dxconsole
         /usr/bin/X11/dxpause
         /usr/bin/X11/dxsysinfo
         Networking (危险程度 - 高)
         SSRT2340 /usr/sbin/telnetd
         SSRT2270 BIND resolver glibc
         SSRT2309 rpc XDR_ARRAY
        目前还没有具体技术细节。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在没有打补丁之前请加强本地用户的控制,只允许可信用户访问。
        厂商补丁:
        Compaq
        ------
        Compaq已经为此发布了一个安全公告(SSRT2275)以及相应补丁:
        SSRT2275:HP Tru64 UNIX - Potential Buffer Overflows & SSRT2229 Potential Denial of Service
        链接:
        http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11

        HP已经为Tru64 UNIX/TruCluster systems提供了相关补丁,注意必须先安装相关的补丁工具(patchkit)。
         HP Tru64 UNIX/TruCluster V5.1A:
         必备条件: V5.1A PK2 (BL2)已经安装:
         ERP Kit名称: T64V51AB2-C0041402-15271-ES-20020827 .tar
         Kit位置:
         ftp://ftp1.support.compaq.com/public/unix/v5.1a/
         HP Tru64 UNIX V5.1A PK1 (BL1)已经安装:
         升级到最低的PK2 (BL2)然后安装ERP
         T64V51AB2-C0041402-15271-ES-20020827 .tar
         HP Tru64 UNIX/TruCluster V5.1:
         必备条件: V5.1A PK2 (BL2)已经安装:
         ERP Kit名称: T64V51B19-C0136901-15143-ES-20020817 .tar
         Kit位置:
         ftp://ftp1.support.compaq.com/public/unix/v5.1/
         HP Tru64 UNIX V5.1 PK4 (BL18)已经安装:
         升级到最低的PK2 (BL2)然后安装ERP
         T64V51B19-C0136901-15143-ES-20020817.tar
         HP Tru64 UNIX/TruCluster V5.0A:
         必备条件: V5.0A PK3 (BL17)已经安装:
         ERP Kit名称: T64V50AB17-C0018406-15268-ES-20020827 .tar
         Kit位置:
         ftp://ftp1.support.compaq.com/public/unix/v5.0a/
         HP Tru64 UNIX/TruCluster V4.0G:
         必备条件: V4.0G K3 (BL17)已经安装:
         ERP Kit名称: T64V40GB17-C0010410-15273-ES-20020827 .tar
         Kit位置:
         ftp://ftp1.support.compaq.com/public/unix/v4.0g/
         HP Tru64 UNIX/TruCluster V4.0F:
         必备条件: V4.0F PK7 (BL18)已经安装:
         ERP Kit名称: DUV40FB18-C0067405-15263-ES-20020827 .tar
         Kit位置:
         ftp://ftp1.support.compaq.com/public/unix/v4.0f/
         HP Tru64 UNIX 4.0F PK6 (BL17)已经安装:
         升级到最低的PK7 (BL18)然后安装ERP
         DUV40FB18-C0067405-15263-ES-20020827.tar
        补丁下载:
        Compaq Tru64 4.0 g PK3 (BL17):
        HP Patch T64V40GB17-C0010410-15273-ES-20020827.tar
        ftp://ftp1.support.compaq.com/public/unix/v4.0g/T64V40GB17-C0010410-15273-ES-20020827.tar
        Requires Tru64 V4.0G PK3 (BL17).
        Compaq Tru64 4.0 g:
        Compaq Tru64 4.0 f PK7 (BL18):
        HP Patch DUV40FB18-C0067405-15263-ES-20020827.tar
        ftp://ftp1.support.compaq.com/public/unix/v4.0f/DUV40FB18-C0067405-15263-ES-20020827.tar
        Requires Tru64 V4.0F PK7 (BL18).
        Compaq Tru64 4.0 f PK6 (BL17):
        Compaq Tru64 4.0 f:
        Compaq Tru64 5.0 a PK3 (BL17):
        HP Patch T64V50AB17-C0018406-15268-ES-20020827.tar
        ftp://ftp1.support.compaq.com/public/unix/v5.0a/T64V50AB17-C0018406-15268-ES-20020827.tar
        Requires Tru64 V5.0A PK3 (BL17).
        Compaq Tru64 5.0 a:
        Compaq Tru64 5.0 PK4 (BL18):
        Compaq Tru64 5.0 PK4 (BL17):
        Compaq Tru64 5.1 a PK2 (BL2):
        HP Patch T64V51AB2-C0041402-15271-ES-20020827.tar
        ftp://ftp1.support.compaq.com/public/unix/v5.1a/T64V51AB2-C0041402-15271-ES-20020827.tar
        Requires Tru64 V5.1A PK2 (BL2).
        Compaq Tru64 5.1 a PK1 (BL1):
        Compaq Tru64 5.1 a:
        Compaq Tru64 5.1 PK5 (BL19):
        HP Patch T64V51B19-C0136901-15143-ES-20020817.tar
        ftp://ftp1.support.compaq.com/public/unix/v5.1/T64V51B19-C0136901-15143-ES-20020817.tar
        Requires Tru64 V5.1 PK5 (BL19).

- 漏洞信息

5129
Microsoft IE Download File Origin Spoofing
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Microsoft Internet Explorer contains a flaw that may allow a malicious user to Spoof the source of a download. The issue is triggered when specifically crafted URL is entered into Internet Explorer. It is possible that the flaw may trick the user into thinking the download is from a trusted site resulting in a loss of integrity.

- 时间线

2002-08-23 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站