CVE-2003-0146
CVSS7.5
发布时间 :2003-03-31 00:00:00
修订时间 :2016-10-17 22:30:06
NMCOS    

[原文]Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows.


[CNNVD]Netpbm多个缓冲区溢出漏洞(CNNVD-200303-093)

        NetPBM 9.20及其之前的版本,可能还包括其他版本存在多个漏洞。远程攻击者可以借助“数学溢出错误”如(1)整数符号错误,或(2)整数溢出导致服务拒绝或可以执行任意代码,该漏洞还能够导致缓冲区溢出。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0146
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200303-093
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000656
(UNKNOWN)  CONECTIVA  CLSA-2003:656
http://marc.info/?l=bugtraq&m=104644687816522&w=2
(UNKNOWN)  BUGTRAQ  20030228 NetPBM, multiple vulnerabilities
http://www.debian.org/security/2003/dsa-263
(VENDOR_ADVISORY)  DEBIAN  DSA-263
http://www.kb.cert.org/vuls/id/630433
(UNKNOWN)  CERT-VN  VU#630433
http://www.redhat.com/support/errata/RHSA-2003-060.html
(UNKNOWN)  REDHAT  RHSA-2003:060
http://www.securityfocus.com/bid/6979
(UNKNOWN)  BID  6979
http://xforce.iss.net/xforce/xfdb/11463
(UNKNOWN)  XF  netpbm-multiple-bo(11463)

- 漏洞信息

Netpbm多个缓冲区溢出漏洞
高危 缓冲区溢出
2003-03-31 00:00:00 2005-10-20 00:00:00
远程  
        NetPBM 9.20及其之前的版本,可能还包括其他版本存在多个漏洞。远程攻击者可以借助“数学溢出错误”如(1)整数符号错误,或(2)整数溢出导致服务拒绝或可以执行任意代码,该漏洞还能够导致缓冲区溢出。

- 公告与补丁

        It has been reported that vendor-supplied patches are forthcoming.
        Mandrake has released an advisory (MDKSA-2003:036) which addresses these issues. Please see the attached advisory for details on obtaining and applying fixes.
        
        Netpbm Netpbm 9.14
        
        Netpbm Netpbm 9.20
        

- 漏洞信息

4810
Netpbm Multiple Unspecified Math Overflows
Local Access Required Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Unknown

- 漏洞描述

Several local overflows exist in NetPBM. NetPBM fails to properly validate user suplied input while processing internal calculations, resulting in a buffer overflow. With a specially crafted request, an attacker can cause local denial of service situations and potentially execute arbitrary commands on the system, resulting in a loss of integrity, and/or availability.

- 时间线

2003-05-27 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Alan Cox released to vendors and mantainers a patch to address this vulnerability. Specific corrective actions are available depending on vendor/distribution.

- 相关参考

- 漏洞作者

- 漏洞信息

Multiple Netpbm Buffer Overflow Vulnerabilities
Boundary Condition Error 6979
Yes No
2003-02-28 12:00:00 2009-07-11 08:06:00
Discovery of these vulnerabilities credited to Al Viro.

- 受影响的程序版本

Netpbm Netpbm 10.14
Netpbm Netpbm 10.13
Netpbm Netpbm 10.12
Netpbm Netpbm 10.11
Netpbm Netpbm 10.10
Netpbm Netpbm 10.9
Netpbm Netpbm 10.8
Netpbm Netpbm 10.7
Netpbm Netpbm 10.6
Netpbm Netpbm 10.5
Netpbm Netpbm 10.4
Netpbm Netpbm 10.3
Netpbm Netpbm 10.2
Netpbm Netpbm 10.1
Netpbm Netpbm 10.0
Netpbm Netpbm 9.25
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0
Netpbm Netpbm 9.24
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 8.0 i686
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ Sun Linux 5.0
Netpbm Netpbm 9.23
Netpbm Netpbm 9.22
Netpbm Netpbm 9.21
Netpbm Netpbm 9.20
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Netpbm Netpbm 9.14
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i586
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 athlon
+ RedHat Linux 7.2
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 7.0
Netpbm Netpbm 9.9
+ RedHat Linux 7.1 i686
+ RedHat Linux 7.1 i586
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1
Netpbm Netpbm 9.5
+ RedHat Linux 7.0 i686
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0

- 漏洞讨论

Several buffer overflow vulnerabilities have been reported for Netpbm. Some of the vulnerabilities are related to the way Netpbm handles filenames over 2 gigabytes in length. Some are signed integer overflow vulnerabilities.

Exploitation of these vulnerabilities may be difficult and may cause the vulnerable application to crash or behave unpredictably.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

It has been reported that vendor-supplied patches are forthcoming.

Mandrake has released an advisory (MDKSA-2003:036) which addresses these issues. Please see the attached advisory for details on obtaining and applying fixes.


Netpbm Netpbm 9.14

Netpbm Netpbm 9.20

Netpbm Netpbm 9.24

Netpbm Netpbm 9.5

Netpbm Netpbm 9.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站