CVE-2002-1200
CVSS7.5
发布时间 :2002-10-28 00:00:00
修订时间 :2016-10-17 22:24:43
NMCOS    

[原文]Balabit Syslog-NG 1.4.x before 1.4.15, and 1.5.x before 1.5.20, when using template filenames or output, does not properly track the size of a buffer when constant characters are encountered during macro expansion, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.


[CNNVD]Syslog-ng远程缓冲区溢出漏洞(CNNVD-200210-304)

        
        Syslog-NG是一款系统日志记录工具,是SYSLOG移植实现。
        Syslog-NG的宏扩展不正确处理常数字符,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以Syslog-NG的进程的权限在系统上执行任意指令。
        为了更容易的指定消息的路径,Syslog-NG以如下宏方式指定目的文件名:
        destination d_messages_by_host {
         file("/var/log/$HOST/messages");
         };
        当指定目的文件内容时也使用了相同的语法:
        destination d_special_messages {
         file("/var/log/messages" template("$ISODATE $HOST $MSG\n"));
         };
        问题存在与宏扩展处理常数字符中,Syslog-NG宏使用一个变量成为'left'的缓冲区,不过当拷贝大量数据到这个缓冲区的时候,没有对缓冲区边界进行完整的检查,攻击者可以提供大量的常数给宏处理,使缓冲区溢出,精心构建常数数据可能以Syslog-NG的进程的权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

cpe:/a:balabit:syslog-ng:1.4.7
cpe:/a:balabit:syslog-ng:1.4.8
cpe:/a:balabit:syslog-ng:1.4.0_rc3
cpe:/a:balabit:syslog-ng:1.5.20
cpe:/a:balabit:syslog-ng:1.4.15
cpe:/a:balabit:syslog-ng:1.5.15
cpe:/a:balabit:syslog-ng:1.4.10
cpe:/a:balabit:syslog-ng:1.4.9

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1200
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1200
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-304
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000547
(UNKNOWN)  CONECTIVA  CLA-2002:547
http://marc.info/?l=bugtraq&m=103426595021928&w=2
(UNKNOWN)  BUGTRAQ  20021010 syslog-ng buffer overflow
http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt
http://www.debian.org/security/2002/dsa-175
(VENDOR_ADVISORY)  DEBIAN  DSA-175
http://www.iss.net/security_center/static/10339.php
(UNKNOWN)  XF  syslogng-macro-expansion-bo(10339)
http://www.linuxsecurity.com/advisories/other_advisory-2513.html
(UNKNOWN)  ENGARDE  ESA-20021029-028
http://www.novell.com/linux/security/advisories/2002_039_syslog_ng.html
(UNKNOWN)  SUSE  SuSE-SA:2002:039
http://www.securityfocus.com/bid/5934
(VENDOR_ADVISORY)  BID  5934

- 漏洞信息

Syslog-ng远程缓冲区溢出漏洞
高危 边界条件错误
2002-10-28 00:00:00 2005-05-13 00:00:00
远程  
        
        Syslog-NG是一款系统日志记录工具,是SYSLOG移植实现。
        Syslog-NG的宏扩展不正确处理常数字符,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以Syslog-NG的进程的权限在系统上执行任意指令。
        为了更容易的指定消息的路径,Syslog-NG以如下宏方式指定目的文件名:
        destination d_messages_by_host {
         file("/var/log/$HOST/messages");
         };
        当指定目的文件内容时也使用了相同的语法:
        destination d_special_messages {
         file("/var/log/messages" template("$ISODATE $HOST $MSG\n"));
         };
        问题存在与宏扩展处理常数字符中,Syslog-NG宏使用一个变量成为'left'的缓冲区,不过当拷贝大量数据到这个缓冲区的时候,没有对缓冲区边界进行完整的检查,攻击者可以提供大量的常数给宏处理,使缓冲区溢出,精心构建常数数据可能以Syslog-NG的进程的权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Balabit
        -------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Balabit syslog-ng 1.4.15:
        Balabit Upgrade Syslog-ng 1.4.16
        
        http://www.balabit.hu/en/downloads/syslog-ng/downloads/

        Balabit Patch syslog-ng 1.4.15/1.5.20 patch
        
        http://downloads.securityfocus.com/vulnerabilities/patches/syslog-ng.patch

        Balabit syslog-ng 1.5.20:
        Balabit Upgrade Syslog-ng 1.5.21
        
        http://www.balabit.hu/en/downloads/syslog-ng/downloads/

        Balabit Patch syslog-ng 1.4.15/1.5.20 patch
        
        http://downloads.securityfocus.com/vulnerabilities/patches/syslog-ng.patch

- 漏洞信息

14508
Balabit Syslog-NG Macro Expansion Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-10-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Syslog-ng Macro Expansion Remote Buffer Overflow Vulnerability
Boundary Condition Error 5934
Yes No
2002-10-10 12:00:00 2009-07-11 06:06:00
Vulnerability reported by Balabit.

- 受影响的程序版本

Balabit syslog-ng 1.5.20
Balabit syslog-ng 1.5.15
Balabit syslog-ng 1.4.15
Balabit syslog-ng 1.4.14
+ Conectiva Linux 8.0
Balabit syslog-ng 1.4.12
Balabit syslog-ng 1.4.11
Balabit syslog-ng 1.4.10
+ EnGarde Secure Linux 1.0.1
Balabit syslog-ng 1.4.9
Balabit syslog-ng 1.4.8
Balabit syslog-ng 1.4.7
Balabit syslog-ng 1.4 .0rc3
Axis Communications StorPoint 1.4.15
Balabit syslog-ng 1.5.21
Balabit syslog-ng 1.4.16
Axis Communications StorPoint 1.4.16

- 不受影响的程序版本

Balabit syslog-ng 1.5.21
Balabit syslog-ng 1.4.16
Axis Communications StorPoint 1.4.16

- 漏洞讨论

A vulnerability has been discovered in syslog-ng.

Reportedly, syslog-ng macro expansion fails to do proper bounds checking when handling constant characters. By passing an overly large amount of constants to a macro, it may be possible to cause a overflow in the macro expansion buffer.

This issue could be exploited by a remote attacker to execute arbitrary commands as the syslog-ng process.

Although discovered for version 1.4.15 and 1.5.20, it is likely that early versions of the software are also vulnerable.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

EnGarde Secure Linux has released a new advisory, ESA-20021029-028, that obsoletes ESA-20021016-025. New fixes are available.

SuSE has released an advisory. Fixes are available.

Fixes have been made available:


Balabit syslog-ng 1.4 .0rc3

Balabit syslog-ng 1.4.10

Balabit syslog-ng 1.4.11

Balabit syslog-ng 1.4.12

Balabit syslog-ng 1.4.14

Axis Communications StorPoint 1.4.15

Balabit syslog-ng 1.4.15

Balabit syslog-ng 1.5.15

Balabit syslog-ng 1.5.20

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站