CVE-2002-1322
CVSS5.0
发布时间 :2002-12-11 00:00:00
修订时间 :2016-10-17 22:25:56
NMCOES    

[原文]Rational ClearCase 4.1, 2002.05, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain packets to port 371, e.g. via nmap.


[CNNVD]Rational ClearCase端口扫描远程拒绝服务攻击漏洞(CNNVD-200212-015)

        
        ClearCase是一款由Rational公司开发和维护的版本控制,工作台管理,构建管理工具。
        Rational ClearCase对端口扫描处理不正确,远程攻击者可以利用这个漏洞使用Nmap扫描程序进行扫描使ClearCase崩溃。
        通过执行Nmap扫描程序对ClearCase系统进行扫描,可导致Rational ClearCase崩溃,需要重新启动恢复正常功能。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:rational_software:clearcase:2002-05-00
cpe:/a:rational_software:clearcase:4.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1322
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1322
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-015
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0084.html
(UNKNOWN)  VULNWATCH  20021122 ClearCase DoS vulnerabilty
http://marc.info/?l=bugtraq&m=103808239618238&w=2
(UNKNOWN)  BUGTRAQ  20021122 ClearCase DoS vulnerabilty
http://www.securityfocus.com/bid/6228
(UNKNOWN)  BID  6228
http://xforce.iss.net/xforce/xfdb/10675
(UNKNOWN)  XF  clearcase-tcp-scan-dos(10675)

- 漏洞信息

Rational ClearCase端口扫描远程拒绝服务攻击漏洞
中危 其他
2002-12-11 00:00:00 2005-10-20 00:00:00
远程  
        
        ClearCase是一款由Rational公司开发和维护的版本控制,工作台管理,构建管理工具。
        Rational ClearCase对端口扫描处理不正确,远程攻击者可以利用这个漏洞使用Nmap扫描程序进行扫描使ClearCase崩溃。
        通过执行Nmap扫描程序对ClearCase系统进行扫描,可导致Rational ClearCase崩溃,需要重新启动恢复正常功能。
        

- 公告与补丁

        厂商补丁:
        Rational Software
        -----------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Rational Software ClearCase 2002.05:
        Rational Patch clearcase_p2002.05.00-12.sun5.tar.gz
        
        http://www.rational.com/techsupport/clearcase/tech/patchlink/new/clearcase/2002.05.00/clearcase_p2002.05.00-12/clearcase_p2002.05.00-12.sun5.tar.gz

        Rational Patch clearcase_p2002.05.00-16
        
        http://www.rational.com/techsupport/clearcase/tech/patchlink/new/clearcase/2002.05.00/clearcase_p2002.05.00-16/

        Rational Patch clearcase_p2002.05.00-15
        
        http://www.rational.com/techsupport/clearcase/tech/patchlink/new/clearcase/2002.05.00/clearcase_p2002.05.00-15/

- 漏洞信息 (22031)

Rational ClearCase 4.1 Portscan Denial Of Service Vulnerability (EDBID:22031)
unix dos
2002-11-22 Verified
0 Stefan Bagdohn
N/A [点击下载]
source: http://www.securityfocus.com/bid/6228/info

Rational ClearCase has been reported to be prone to a denial of service condition. It is possible to cause this condition by portscanning a system running the vulnerable version of ClearCase. This issue was demonstrated using the nmap portscanning utility.

An attacker can exploit this vulnerability by making two consecutive portscans of a vulnerable system. This will cause ClearCase to crash. Restarting the ClearCase service is required to restore functionality.

nmap -vvv -O -sT ip.of.clearcase.system
nmap -vvv -O -sT -p 371 ip.of.clearcase.system		

- 漏洞信息

4605
ClearCase TCP Connect DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-11-22 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Rational ClearCase Portscan Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 6228
Yes No
2002-11-22 12:00:00 2009-07-11 07:16:00
Discovery of this vulnerability credited to Stefan Bagdohn and Marek Rouchal.

- 受影响的程序版本

Rational Software ClearCase 2002.5
Rational Software ClearCase 4.1
- Caldera OpenUnix 8.0
- Caldera UnixWare 7
- Compaq Tru64 5.1 a
- Compaq Tru64 5.1
- Compaq Tru64 5.0 f
- Compaq Tru64 5.0 a
- Compaq Tru64 5.0
- HP HP-UX 11.11
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3.3
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.3
- IBM AIX 5.1
- RedHat Linux 7.2 i386
- RedHat Linux 7.1 i386
- RedHat Linux 7.1 alpha
- RedHat Linux 7.0 sparc
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 alpha
- RedHat Linux 6.2 sparc
- RedHat Linux 6.2 i386
- RedHat Linux 6.2 alpha
- SGI IRIX 6.5.13 m
- SGI IRIX 6.5.13 f
- SGI IRIX 6.5.13
- SGI IRIX 6.5.12 m
- SGI IRIX 6.5.12 f
- SGI IRIX 6.5.12
- SGI IRIX 6.5.11 m
- Siemens Reliant UNIX 5.45
- Siemens Reliant UNIX 5.44
- Siemens Reliant UNIX 5.43
- Sun Solaris 8_x86
- Sun Solaris 8_sparc
- Sun Solaris 7.0_x86
- Sun Solaris 7.0
- Sun Solaris 2.6_x86
- Sun Solaris 2.6

- 漏洞讨论

Rational ClearCase has been reported to be prone to a denial of service condition. It is possible to cause this condition by portscanning a system running the vulnerable version of ClearCase. This issue was demonstrated using the nmap portscanning utility.

An attacker can exploit this vulnerability by making two consecutive portscans of a vulnerable system. This will cause ClearCase to crash. Restarting the ClearCase service is required to restore functionality.

- 漏洞利用

The following proof of concepts were provided:

nmap -vvv -O -sT ip.of.clearcase.system
nmap -vvv -O -sT -p 371 ip.of.clearcase.system

- 解决方案

Patches are available:


Rational Software ClearCase 2002.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站