CVE-2002-1281
CVSS7.5
发布时间 :2002-11-29 00:00:00
修订时间 :2016-10-17 22:25:21
NMCOS    

[原文]Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and earlier, allows local and remote attackers to execute arbitrary code via a certain URL.


[CNNVD]KDE KIO子系统网络协议实现任意命令执行漏洞(CNNVD-200211-056)

        
        KDE是开放源代码用于Unix工作站的图形桌面环境,KDE提供通过KIO子系统支持各种网络协议。这些协议使用包含扩展.protocol的文本文件实现,一般存在于KDE安装root目录下的shared/services/子目录。
        KDE KIO子系统的rlogin和telnet协议实现存在漏洞,远程攻击者可以利用这个漏洞以当前用户权限在系统上执行任意命令。
        攻击者可以构建包含恶意URL的HTML页面,HTML邮件或其他使用KIO的应用程序,当目标用户被诱使点击的时候可导致以目标用户权限在系统上执行任意指令。
        rlogin协议在所有系统中都存在,而telnet协议只影响KDE 2系统。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:kde:kde:2.1
cpe:/o:kde:kde:3.0
cpe:/o:kde:kde:2.2.2
cpe:/o:kde:kde:2.2
cpe:/o:kde:kde:3.0.4
cpe:/o:kde:kde:3.0.3
cpe:/o:kde:kde:3.0.2
cpe:/o:kde:kde:3.0.1
cpe:/o:kde:kde:2.1.2
cpe:/o:kde:kde:2.2.1
cpe:/o:kde:kde:2.1.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1281
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1281
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200211-056
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-012.0.txt
(UNKNOWN)  CALDERA  CSSA-2003-012.0
http://marc.info/?l=bugtraq&m=103712550205730&w=2
(UNKNOWN)  BUGTRAQ  20021112 KDE Security Advisory: rlogin.protocol and telnet.protocol URL KIO Vulnerability
http://marc.info/?l=bugtraq&m=103728981029342&w=2
(UNKNOWN)  BUGTRAQ  20021114 GLSA: kdelibs
http://www.debian.org/security/2002/dsa-204
(UNKNOWN)  DEBIAN  DSA-204
http://www.iss.net/security_center/static/10602.php
(VENDOR_ADVISORY)  XF  kde-rlogin-command-execution(10602)
http://www.kde.org/info/security/advisory-20021111-1.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.kde.org/info/security/advisory-20021111-1.txt
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-079.php
(UNKNOWN)  MANDRAKE  MDKSA-2002:079
http://www.redhat.com/support/errata/RHSA-2002-220.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2002:220
http://www.securityfocus.com/bid/6182
(VENDOR_ADVISORY)  BID  6182

- 漏洞信息

KDE KIO子系统网络协议实现任意命令执行漏洞
高危 访问验证错误
2002-11-29 00:00:00 2005-10-20 00:00:00
远程  
        
        KDE是开放源代码用于Unix工作站的图形桌面环境,KDE提供通过KIO子系统支持各种网络协议。这些协议使用包含扩展.protocol的文本文件实现,一般存在于KDE安装root目录下的shared/services/子目录。
        KDE KIO子系统的rlogin和telnet协议实现存在漏洞,远程攻击者可以利用这个漏洞以当前用户权限在系统上执行任意命令。
        攻击者可以构建包含恶意URL的HTML页面,HTML邮件或其他使用KIO的应用程序,当目标用户被诱使点击的时候可导致以目标用户权限在系统上执行任意指令。
        rlogin协议在所有系统中都存在,而telnet协议只影响KDE 2系统。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 关闭KDE系统中的rlogin和telnet KIO协议,这可以通过删除任何在系统中的'rlogin.protocol'和'telnet.protocol'文件完成。
        厂商补丁:
        KDE
        ---
        KDE已经为此发布了一个安全公告(KDE-20021111-1)以及相应补丁:
        KDE-20021111-1:rlogin.protocol and telnet.protocol URL KIO Vulnerability
        链接:
        http://www.kde.org/info/security/advisory-20021111-1.txt

        补丁下载:
        KDE Upgrade KDE 3.0.5
        
        http://download.kde.org/stable/3.0.5/

        KDE Patch post-3.0.4-kdelibs-kio-misc.diff
        ftp://ftp.kde.org/pub/kde/security_patches/post-3.0.4-kdelibs-kio-misc.diff

- 漏洞信息

12996
KDE KIO Subsystem rlogin Arbitrary Remote Command Execution
Remote / Network Access

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-11-11 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

KDE KIO Subsystem Network Protocol Implementation Arbitrary Command Execution Vulnerability
Access Validation Error 6182
Yes No
2002-11-12 12:00:00 2009-07-11 07:16:00
This vulnerability was first announced in a KDE security advisory.

- 受影响的程序版本

KDE KDE 3.0.4
+ Conectiva Linux 8.0
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
+ Gentoo Linux 1.2
KDE KDE 3.0.3
+ Conectiva Linux 8.0
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ FreeBSD FreeBSD 4.7 -STABLE
+ FreeBSD FreeBSD 4.7 -STABLE
+ Mandriva Linux Mandrake 9.0
+ Mandriva Linux Mandrake 9.0
KDE KDE 3.0.2
+ Mandriva Linux Mandrake 8.2
KDE KDE 3.0.1
KDE KDE 3.0
+ Conectiva Linux 8.0
KDE KDE 2.2.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.1
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux Advanced Work Station 2.1
+ Sun Linux 5.0.7
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.5
KDE KDE 2.2.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Caldera OpenLinux Workstation 3.1
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
KDE KDE 2.2
KDE KDE 2.1.2
+ Conectiva Linux 7.0
KDE KDE 2.1.1
KDE KDE 2.1

- 漏洞讨论

Reportedly, the implementation of the rlogin and telnet protocols, by KDE's KIO subsystem, are prone to a remote command execution vulnerability.

An attacker can exploit this vulnerability by using a carefully crafted URL in a KIO-enabled application to execute arbitrary commands on the vulnerable system. Any commands executed in this manner will be executed on the victim user's account with the privileges of the victim user.

This vulnerability can also be exploited by using a carefully crafted URL in a HTML page or in a HTML email.

- 漏洞利用

There is no exploit required.

- 解决方案

Gentoo Linux has released an advisory. Users of kde-base/kdelibs-3.0.4 and earlier are advised to update their systems by issuing the following commands:

emerge rsync
emerge kdelibs
emerge clean

RedHat has released an advisory, RHSA-2002:220-40, that contains many fixes. Information about obtaining and applying fixes are available in the referenced advisory.

Debian has made fixes available, and has announced the information in DSA 204-1.

Updates are available:


KDE KDE 2.2.1

KDE KDE 2.2.2

KDE KDE 3.0

KDE KDE 3.0.1

KDE KDE 3.0.2

KDE KDE 3.0.3

KDE KDE 3.0.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站