发布时间 :2004-05-04 00:00:00
修订时间 :2017-07-10 21:29:34

[原文]Multiple buffer overflows in vfte, based on FTE, before 0.50, allow local users to execute arbitrary code.



- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:3.0Debian Debian Linux 3.0
cpe:/a:fte:fte_text_editorLinux FTE Text Editor

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  10041
(UNKNOWN)  XF  ftetexteditor-vfte-bo(15726)

- 漏洞信息

危急 边界条件错误
2004-05-04 00:00:00 2005-10-20 00:00:00

- 公告与补丁


- 漏洞信息

FTE Text Editor vfte Overflow
Local Access Required Input Manipulation
Loss of Integrity

- 漏洞描述

A local overflow exists in FTE Text Editor. The FTE Text Editor lacks adequate bounds checking on the command line arguments. With a specially crafted request, an attacker can cause the setuid binary "vfte" to execute arbitrary commands as root, resulting in a loss of integrity.

- 时间线

2004-04-05 2003-08-02
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to avoid privilege escalation by implementing the following workaround: - Remove setuid privileges from "vfte" binary.

- 相关参考

- 漏洞作者

- 漏洞信息

FTE Multiple Local Unspecified Buffer Overflow Vulnerabilities
Boundary Condition Error 10041
No Yes
2004-04-04 12:00:00 2009-07-12 04:06:00
Discovery of these issues are credited to Steve Kemp and Jaguar.

- 受影响的程序版本

fte text editor 0.49.13
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0

- 漏洞讨论

It has been reported that vfte is prone to multiple unspecified buffer overflow vulnerabilities. These issues are due to a failure of the application to verify buffer boundaries while processing user supplied input.

Successful exploitation would immediately produce a denial of service condition in the affected process. This issue may also be leveraged to execute code on the affected system with root privileges, as this application is setuid root.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

Debian has released advisory DSA 472-1 dealing with this issue. Please see the referenced advisory for more information.

fte text editor 0.49.13

- 相关参考