CVE-2003-0163
CVSS5.0
发布时间 :2003-05-05 00:00:00
修订时间 :2016-10-17 22:30:17
NMCOS    

[原文]decrypt_msg for the Gaim-Encryption GAIM plugin 1.15 and earlier does not properly validate a message length parameter, which allows remote attackers to cause a denial of service (crash) via a negative length, which overwrites arbitrary heap memory with a zero byte.


[CNNVD]Gaim-Encryption远程堆破坏漏洞(CNNVD-200305-015)

        
        GAIM是一款多协议即时通信客户端,兼容AIM、ICQ、MSN Messenger、Jabber等其他协议,Gaim-Encryption插件用于提供在用户间提供透明信息加密。
        Gaim-Encryption插件不充分检查消息长度参数,远程攻击者可以利用这个漏洞使GAIM客户端进程的堆内容造到破坏,产生拒绝服务。
        Gaim-Encryption插件的decrypt_msg函数用于解密GAIM消息,使用sscanf读取外部提供的消息长度参数时缺少正确的处理,如果远程用户构造的消息使用负长度值的包给GAIM客户端,可导致任意堆地址被零字节覆盖,或越界读取其他堆地址信息。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:gaim-encryption:gaim-encryption:1.13
cpe:/a:gaim-encryption:gaim-encryption:1.15
cpe:/a:gaim-encryption:gaim-encryption:1.14

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0163
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0163
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200305-015
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105013281120352&w=2
(UNKNOWN)  BUGTRAQ  20030412 R7-0013: Heap Corruption in Gaim-Encryption Plugin
http://www.rapid7.com/advisories/R7-0013.html
(VENDOR_ADVISORY)  MISC  http://www.rapid7.com/advisories/R7-0013.html
http://www.securityfocus.com/bid/7182
(VENDOR_ADVISORY)  BID  7182

- 漏洞信息

Gaim-Encryption远程堆破坏漏洞
中危 边界条件错误
2003-05-05 00:00:00 2005-10-20 00:00:00
远程  
        
        GAIM是一款多协议即时通信客户端,兼容AIM、ICQ、MSN Messenger、Jabber等其他协议,Gaim-Encryption插件用于提供在用户间提供透明信息加密。
        Gaim-Encryption插件不充分检查消息长度参数,远程攻击者可以利用这个漏洞使GAIM客户端进程的堆内容造到破坏,产生拒绝服务。
        Gaim-Encryption插件的decrypt_msg函数用于解密GAIM消息,使用sscanf读取外部提供的消息长度参数时缺少正确的处理,如果远程用户构造的消息使用负长度值的包给GAIM客户端,可导致任意堆地址被零字节覆盖,或越界读取其他堆地址信息。
        

- 公告与补丁

        厂商补丁:
        Gaim-Encryption
        ---------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Gaim-Encryption Upgrade encrypt-1.18.tar.gz
        
        http://sourceforge.net/project/showfiles.php?group_id=57740&release_id=151767

- 漏洞信息

8625
Gaim-Encryption GAIM plugin decrypt_msg Heap Corruption

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-04-11 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Gaim-Encryption Remote Heap Corruption Vulnerability
Boundary Condition Error 7182
Yes No
2003-03-24 12:00:00 2009-07-11 09:06:00
The discovery of this vulnerability has been credited to Rapid 7.

- 受影响的程序版本

Gaim-Encryption Gaim-Encryption 1.15
Gaim-Encryption Gaim-Encryption 1.14
Gaim-Encryption Gaim-Encryption 1.13
Gaim-Encryption Gaim-Encryption 1.18
Gaim-Encryption Gaim-Encryption 1.17
Gaim-Encryption Gaim-Encryption 1.16

- 不受影响的程序版本

Gaim-Encryption Gaim-Encryption 1.18
Gaim-Encryption Gaim-Encryption 1.17
Gaim-Encryption Gaim-Encryption 1.16

- 漏洞讨论

A vulnerability has been discovered in Gaim-Encryption 1.15 and earlier. An issue involving insufficient bounds checking may allow a remote attacker to corrupt heap memory. This issue could be triggered by constructing a packet with a negative length parameter. Successful exploitation of this issue may result in a denial of service. Code execution may also be possible, though this is unconfirmed.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

An updated version of Gaim-Encryption has been released which addresses this issue. It should be noted that version 1.15 was initially thought to fix this vulnerability however, some clients running 1.15 may still be affected. Users are strongly encouraged to upgrade to Gaim-Encryption 1.16 or later.


Gaim-Encryption Gaim-Encryption 1.13

Gaim-Encryption Gaim-Encryption 1.14

Gaim-Encryption Gaim-Encryption 1.15

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站