CVE-2003-0564
CVSS5.0
发布时间 :2003-12-01 00:00:00
修订时间 :2016-10-17 22:35:26
NMCOS    

[原文]Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.


[CNNVD]多家厂商S/MIME ASN.1解析远程拒绝服务攻击漏洞(CNNVD-200312-001)

        
        S/MIME是用于邮件加密的证书实现。
        多家厂商S/MIME实现在处理异常ASN.1元素时不正确,远程攻击者可以利用这个漏洞发送异常ASN.1元素而导致系统产生拒绝服务。
        目前Hitachi PKI Runtime Library和Hitachi Hitachi Groupmax Mail证实存在此类漏洞。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:hitachi:pki_runtime_library
cpe:/a:hitachi:groupmax_mail_-_security_option:6.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:914Red Hat Enterprise 3 S/MIME Protocol Denial of Service Vulnerability
oval:org.mitre.oval:def:872Red Hat S/MIME Protocol Denial of Service Vulnerability
oval:org.mitre.oval:def:11462Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remo...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0564
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0564
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-001
(官方数据源) CNNVD

- 其它链接及资源

ftp://patches.sgi.com/support/free/security/advisories/20040402-01-U.asc
(UNKNOWN)  SGI  20040402-01-U
http://marc.info/?l=bugtraq&m=108448379429944&w=2
(UNKNOWN)  HP  SSRT4722
http://marc.info/?l=bugtraq&m=109900315219363&w=2
(UNKNOWN)  FEDORA  FLSA:2089
http://www.kb.cert.org/vuls/id/428230
(VENDOR_ADVISORY)  CERT-VN  VU#428230
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021
(UNKNOWN)  MANDRAKE  MDKSA-2004:021
http://www.redhat.com/support/errata/RHSA-2004-110.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:110
http://www.redhat.com/support/errata/RHSA-2004-112.html
(UNKNOWN)  REDHAT  RHSA-2004:112
http://www.securityfocus.com/bid/8981
(VENDOR_ADVISORY)  BID  8981
http://www.uniras.gov.uk/vuls/2003/006489/smime.htm
(VENDOR_ADVISORY)  MISC  http://www.uniras.gov.uk/vuls/2003/006489/smime.htm
http://xforce.iss.net/xforce/xfdb/13603
(UNKNOWN)  XF  smime-asn1-bo(13603)

- 漏洞信息

多家厂商S/MIME ASN.1解析远程拒绝服务攻击漏洞
中危 其他
2003-12-01 00:00:00 2005-10-20 00:00:00
远程  
        
        S/MIME是用于邮件加密的证书实现。
        多家厂商S/MIME实现在处理异常ASN.1元素时不正确,远程攻击者可以利用这个漏洞发送异常ASN.1元素而导致系统产生拒绝服务。
        目前Hitachi PKI Runtime Library和Hitachi Hitachi Groupmax Mail证实存在此类漏洞。
        

- 公告与补丁

        厂商补丁:
        Hitachi
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.hitachi.co.jp/Prod/comp/soft1/open-e/gmax/html/gmaxup.htm

- 漏洞信息

4197
Mozilla / NSS S/MIME Crafted ASN.1 Construct Handling Remote Code Execution

- 漏洞描述

- 时间线

2004-03-11 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Multiple Vendor S/MIME ASN.1 Parsing Denial of Service Vulnerabilities
Failure to Handle Exceptional Conditions 8981
Yes No
2003-11-05 12:00:00 2009-07-12 12:56:00
The disclosure of these issues has been credited to The U.K. National Infrastructure Security Co-ordination Center (NISCC).

- 受影响的程序版本

SGI ProPack 3.0
SGI ProPack 2.4
SGI ProPack 2.3
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
Red Hat Fedora Core1
Mozilla Network Security Services (NSS) 3.8
+ Galeon Galeon Browser 1.2.13
+ Mozilla Browser 1.4.1
+ Mozilla Browser 1.4.1
+ Mozilla Browser 1.4 b
+ Mozilla Browser 1.4 b
+ Mozilla Browser 1.4 a
+ Mozilla Browser 1.4 a
+ Mozilla Browser 1.4
+ Mozilla Browser 1.4
Mozilla Browser 1.4.2
Mozilla Browser 1.4.1
Mozilla Browser 1.4 b
Mozilla Browser 1.4 a
Mozilla Browser 1.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
Hitachi PKI Runtime Library
Hitachi Groupmax Mail - Security Option 6.0
Mozilla Network Security Services (NSS) 3.9
+ Mozilla Browser 1.5

- 不受影响的程序版本

Mozilla Network Security Services (NSS) 3.9
+ Mozilla Browser 1.5

- 漏洞讨论

It has been reported that various implementations of S/MIME protocol may be affected by denial of service issues due to improper handling of exceptional ASN.1 elements. An attacker may exploit this issue by sending an exceptional ASN.1 element to a vulnerable system in order to cause a denial of service condition.

Currently Hitachi PKI Runtime Library and Hitachi Hitachi Groupmax Mail - Security Option version 6 and possibly prior have reported to be vulnerable, however this BID will be updated as more information becomes available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

SGI have released an advisory (20040402-01-U) and a patch to address this issue in SGI ProPack version 2.3 and 2.4. The vendor has advised that customers apply this patch as soon as possible. Further details regarding obtaining and applying an appropriate patch can be found in the referenced advisory. Patch is linked below.

Mandrake has released an advisory MDKSA-2004:021 to address this issue. Please see the referenced advisory for more information.

Redhat has released advisory RHSA-2004:112-01 dealing with this issue. Please see the reference for more information.

RedHat has released an update to the previously released advisory RHSA-2004:110-19, RHSA-2004:110-20 is now available and deals with this issue for their Enterprise linux distribution. Please see the referenced advisory for more information and details on obtaining fixes.

HP has released advisory HPSBUX01036-SSRT4722 dealing with this and other issues; fixes have been provided.

SGI has released an advisory (20040506-01-U) with Patch 10075 for SGI
ProPack 3 to address this and other issues. Please see the referenced
advisory for more information.

The Fedora Legacy project has released advisory FLSA-2004:2089 along with fixes to address multiple issues in RedHat Fedora Core 1, and RedHat Linux 7.3 and 9.0. Please see the referenced advisory for further information.


Mozilla Browser 1.4 b

Mozilla Browser 1.4

Mozilla Browser 1.4 a

Mozilla Browser 1.4.1

Mozilla Browser 1.4.2

SGI ProPack 2.3

SGI ProPack 2.4

SGI ProPack 3.0

Mozilla Network Security Services (NSS) 3.8

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站