CVE-2002-1158
CVSS7.2
发布时间 :2002-12-18 00:00:00
修订时间 :2016-10-17 22:24:14
NMCOS    

[原文]Buffer overflow in the irw_through function for Canna 3.5b2 and earlier allows local users to execute arbitrary code as the bin user.


[CNNVD]Canna Server本地缓冲区溢出漏洞(CNNVD-200212-030)

        
        Canna Server是一款用于日文字符输入的程序。
        Canna Server存在一个本地缓冲区溢出漏洞,本地攻击者可以利用这个漏洞获得系统bin权限。
        目前没有获得详细漏洞细节。
        Red Hat Linux 7.1、7.2、7.3和8.0附带有此漏洞Canna包,但是,只有当日文语言支持的时候才安装此包。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1158
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1158
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-030
(官方数据源) CNNVD

- 其它链接及资源

http://canna.sourceforge.jp/sec/Canna-2002-01.txt
(UNKNOWN)  CONFIRM  http://canna.sourceforge.jp/sec/Canna-2002-01.txt
http://marc.info/?l=bugtraq&m=104041812206344&w=2
(UNKNOWN)  BUGTRAQ  20021220 GLSA: canna
http://www.debian.org/security/2003/dsa-224
(UNKNOWN)  DEBIAN  DSA-224
http://www.redhat.com/support/errata/RHSA-2002-246.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2002:246
http://www.redhat.com/support/errata/RHSA-2002-261.html
(UNKNOWN)  REDHAT  RHSA-2002:261
http://www.redhat.com/support/errata/RHSA-2003-115.html
(UNKNOWN)  REDHAT  RHSA-2003:115
http://www.securityfocus.com/bid/6351
(VENDOR_ADVISORY)  BID  6351
http://xforce.iss.net/xforce/xfdb/10831
(VENDOR_ADVISORY)  XF  canna-irwthrough-bo(10831)

- 漏洞信息

Canna Server本地缓冲区溢出漏洞
高危 边界条件错误
2002-12-18 00:00:00 2005-05-13 00:00:00
本地  
        
        Canna Server是一款用于日文字符输入的程序。
        Canna Server存在一个本地缓冲区溢出漏洞,本地攻击者可以利用这个漏洞获得系统bin权限。
        目前没有获得详细漏洞细节。
        Red Hat Linux 7.1、7.2、7.3和8.0附带有此漏洞Canna包,但是,只有当日文语言支持的时候才安装此包。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2002:246-18)以及相应补丁:
        RHSA-2002:246-18:Updated Canna packages fix vulnerabilities
        链接:https://www.redhat.com/support/errata/RHSA-2002-246.html
        补丁下载:
        Red Hat Linux 7.1:
        SRPMS:
        ftp://updates.redhat.com/7.1/en/os/SRPMS/Canna-3.5b2-42.7.1.src.rpm
        alpha:
        ftp://updates.redhat.com/7.1/en/os/alpha/Canna-3.5b2-42.7.1.alpha.rpm
        ftp://updates.redhat.com/7.1/en/os/alpha/Canna-devel-3.5b2-42.7.1.alpha.rpm
        ftp://updates.redhat.com/7.1/en/os/alpha/Canna-libs-3.5b2-42.7.1.alpha.rpm
        i386:
        ftp://updates.redhat.com/7.1/en/os/i386/Canna-3.5b2-42.7.1.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/Canna-devel-3.5b2-42.7.1.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/Canna-libs-3.5b2-42.7.1.i386.rpm
        ia64:
        ftp://updates.redhat.com/7.1/en/os/ia64/Canna-3.5b2-42.7.1.ia64.rpm
        ftp://updates.redhat.com/7.1/en/os/ia64/Canna-devel-3.5b2-42.7.1.ia64.rpm
        ftp://updates.redhat.com/7.1/en/os/ia64/Canna-libs-3.5b2-42.7.1.ia64.rpm
        Red Hat Linux 7.2:
        SRPMS:
        ftp://updates.redhat.com/7.2/en/os/SRPMS/Canna-3.5b2-50.7.2.src.rpm
        i386:
        ftp://updates.redhat.com/7.2/en/os/i386/Canna-3.5b2-50.7.2.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/Canna-devel-3.5b2-50.7.2.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/Canna-libs-3.5b2-50.7.2.i386.rpm
        ia64:
        ftp://updates.redhat.com/7.2/en/os/ia64/Canna-3.5b2-50.7.2.ia64.rpm
        ftp://updates.redhat.com/7.2/en/os/ia64/Canna-devel-3.5b2-50.7.2.ia64.rpm
        ftp://updates.redhat.com/7.2/en/os/ia64/Canna-libs-3.5b2-50.7.2.ia64.rpm
        Red Hat Linux 7.3:
        SRPMS:
        ftp://updates.redhat.com/7.3/en/os/SRPMS/Canna-3.5b2-62.7.3.src.rpm
        i386:
        ftp://updates.redhat.com/7.3/en/os/i386/Canna-3.5b2-62.7.3.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/Canna-devel-3.5b2-62.7.3.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/Canna-libs-3.5b2-62.7.3.i386.rpm
        Red Hat Linux 8.0:
        SRPMS:
        ftp://updates.redhat.com/8.0/en/os/SRPMS/Canna-3.5b2-70.8.0.1.src.rpm
        i386:
        ftp://updates.redhat.com/8.0/en/os/i386/Canna-3.5b2-70.8.0.1.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/Canna-devel-3.5b2-70.8.0.1.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/Canna-libs-3.5b2-70.8.0.1.i386.rpm
        校验:
        MD5 sum Package Name
        --------------------------------------------------------------------------
        64918a96baadf160a39ab69d181873a1 7.1/en/os/SRPMS/Canna-3.5b2-42.7.1.src.rpm
        e05db6df9c005d54e339d52a24fea16c 7.1/en/os/alpha/Canna-3.5b2-42.7.1.alpha.rpm
        7fef35d1254f1502bb4b8c2b0fb12b14 7.1/en/os/alpha/Canna-devel-3.5b2-42.7.1.alpha.rpm
        667524bea77fa4965c53023d784c9e62 7.1/en/os/alpha/Canna-libs-3.5b2-42.7.1.alpha.rpm
        20b1224527f50242713cf4b65c61e639 7.1/en/os/i386/Canna-3.5b2-42.7.1.i386.rpm
        e5b92ea118f3459ae8fac8ba11bf85d7 7.1/en/os/i386/Canna-devel-3.5b2-42.7.1.i386.rpm
        5c43a46ccf5fb34660d1b5c3194b8586 7.1/en/os/i386/Canna-libs-3.5b2-42.7.1.i386.rpm
        e67dc55b400e9d375a2370a800b08108 7.1/en/os/ia64/Canna-3.5b2-42.7.1.ia64.rpm
        597a62b098378cb5866ebe2c660e6727 7.1/en/os/ia64/Canna-devel-3.5b2-42.7.1.ia64.rpm
        15ec98018b4cd74789bd3c731cf1619c 7.1/en/os/ia64/Canna-libs-3.5b2-42.7.1.ia64.rpm
        2a1ea81d34ad09f3465034178feef85f 7.2/en/os/SRPMS/Canna-3.5b2-50.7.2.src.rpm
        d74c4ac9644ae93572f75e45f43f509c 7.2/en/os/i386/Canna-3.5b2-50.7.2.i386.rpm
        a6013cd21389fc8ad942f6f91b699d4a 7.2/en/os/i386/Canna-devel-3.5b2-50.7.2.i386.rpm
        89e08e149706012ed225cc6bf3bb9956 7.2/en/os/i386/Canna-libs-3.5b2-50.7.2.i386.rpm
        9396ca437442d715f099c1092da2d560 7.2/en/os/ia64/Canna-3.5b2-50.7.2.ia64.rpm
        029f9d01a2e0cccaa258271638f7b1aa 7.2/en/os/ia64/Canna-devel-3.5b2-50.7.2.ia64.rpm
        09780967d122a75ab40ca3625f4c6c4d 7.2/en/os/ia64/Canna-libs-3.5b2-50.7.2.ia64.rpm
        f8b1a676c1b65690d1802e34bd1d4444 7.3/en/os/SRPMS/Canna-3.5b2-62.7.3.src.rpm
        3e0fc1f12ad366b802bddbd6958218a8 7.3/en/os/i386/Canna-3.5b2-62.7.3.i386.rpm
        97d744e904f7ecc37d1b86e5df338a77 7.3/en/os/i386/Canna-devel-3.5b2-62.7.3.i386.rpm
        0356e982e4e043992f694430fabbab81 7.3/en/os/i386/Canna-libs-3.5b2-62.7.3.i386.rpm
        eecd0839f914bac15e458933c8831cf7 8.0/en/os/SRPMS/Canna-3.5b2-70.8.0.1.src.rpm
        72ffd082d58f626105317c7ddc224fc0 8.0/en/os/i386/Canna-3.5b2-70.8.0.1.i386.rpm
        6539144bcf78e6cabf03df9d60b0ed9b 8.0/en/os/i386/Canna-devel-3.5b2-70.8.0.1.i386.rpm
        8b3cebc96837ece1ddccb3cc7112b8bd 8.0/en/os/i386/Canna-libs-3.5b2-70.8.0.1.i386.rpm
        可以使用如下命令进行校验:
        rpm --checksig -v

- 漏洞信息

14503
Canna irw_through Function Local Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-12-02 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Canna Server Local Buffer Overflow Vulnerability
Boundary Condition Error 6351
No Yes
2002-12-10 12:00:00 2009-07-11 07:16:00
Discovery of this vulnerability is credited to hsj and AIDA Shinra.

- 受影响的程序版本

Canna Canna 3.5 b2
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
- RedHat Linux 8.0
- RedHat Linux 7.3
- RedHat Linux 7.2
- RedHat Linux 7.1
Canna Canna 3.6
- RedHat Linux 8.0
- RedHat Linux 7.3
- RedHat Linux 7.2
- RedHat Linux 7.1

- 不受影响的程序版本

Canna Canna 3.6
- RedHat Linux 8.0
- RedHat Linux 7.3
- RedHat Linux 7.2
- RedHat Linux 7.1

- 漏洞讨论

A buffer overflow vulnerability has been discovered in Canna server. By triggering this condition it may be possible for a local attacker to execute arbitrary code with 'bin' level privileges.

It should be noted that Canna is typically installed only when Japanese language support is enabled.

Precise technical details regarding this vulnerability are not yet known. This BID will be updated as more information becomes available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

RedHat has released a security advisory (RHSA-2002:246-18) containing fixes which address this issue.

Gentoo has released an advisory and fix for this issue. Please see the attached advisory for details on obtaining and applying fixes.

Fixes:


Canna Canna 3.5 b2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站