CVE-2003-0689
CVSS7.5
发布时间 :2003-10-20 00:00:00
修订时间 :2008-09-10 15:20:09
NMCOS    

[原文]The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.


[CNNVD]Glibc Getgrouplist函数本地缓冲区溢出漏洞(CNNVD-200310-034)

        
        glibc是绝大多数Linux操作系统中C库的实现。
        glibc包含的getgrouplist函数对组列表缺少充分检查,本地攻击者可以利用这个漏洞进行缓冲区溢出,精心构建提交数据可能以root用户权限在系统上执行任意指令。
        如果组成员的用户超过组列表所指定的大小,就可以触发缓冲区溢出,导致用户应用程序产生段错误,根据应用程序不同,可产生不同安全问题。此漏洞只影响当管理员把一个用户加到应用程序所要求的更多的组时。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:enterprise_linux:2.1::workstation_ia64
cpe:/o:redhat:enterprise_linux:2.1::enterprise_server_ia64
cpe:/o:redhat:enterprise_linux:2.1::advanced_server_ia64
cpe:/o:redhat:enterprise_linux:2.1::workstation
cpe:/o:redhat:enterprise_linux:2.1::advanced_server
cpe:/o:redhat:enterprise_linux:2.1::enterprise_server

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0689
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200310-034
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2003-249.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:249
http://www.redhat.com/support/errata/RHSA-2003-325.html
(UNKNOWN)  REDHAT  RHSA-2003:325

- 漏洞信息

Glibc Getgrouplist函数本地缓冲区溢出漏洞
高危 边界条件错误
2003-10-20 00:00:00 2005-10-20 00:00:00
远程  
        
        glibc是绝大多数Linux操作系统中C库的实现。
        glibc包含的getgrouplist函数对组列表缺少充分检查,本地攻击者可以利用这个漏洞进行缓冲区溢出,精心构建提交数据可能以root用户权限在系统上执行任意指令。
        如果组成员的用户超过组列表所指定的大小,就可以触发缓冲区溢出,导致用户应用程序产生段错误,根据应用程序不同,可产生不同安全问题。此漏洞只影响当管理员把一个用户加到应用程序所要求的更多的组时。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:249-11)以及相应补丁:
        RHSA-2003:249-11:Updated glibc packages fix various issues
        链接:https://www.redhat.com/support/errata/RHSA-2003-249.html
        补丁下载:
        Red Hat Enterprise Linux AS (v. 2.1)
        --------------------------------------------------------------------------------
        
        SRPMS:
        glibc-2.2.4-32.8.src.rpm 779b9371ed6f3df44413d43439aedcdb
        
        i386:
        glibc-2.2.4-32.8.i386.rpm a45f96f4d14dc6a7411699dae7929c2b
        glibc-common-2.2.4-32.8.i386.rpm 4307ee9036a34fc75ac369b54560e8b8
        glibc-devel-2.2.4-32.8.i386.rpm d2a171dc3f0e406acb3089edc70add67
        glibc-profile-2.2.4-32.8.i386.rpm ed1d806491ef9bc28f435a7e6c8c8392
        nscd-2.2.4-32.8.i386.rpm 7ada51ed827ebc1091f05c83186f0597
        
        i686:
        glibc-2.2.4-32.8.i686.rpm ef0c8b62114ffdde63dafd6253c7e9d1
        
        ia64:
        glibc-2.2.4-32.8.ia64.rpm 3001471f06cdeb6dbe12a2dca31401a5
        glibc-common-2.2.4-32.8.ia64.rpm 55f60657c2b2f320e2393f6441de56a2
        glibc-devel-2.2.4-32.8.ia64.rpm 6e359bee323035b993214b6bfb89e903
        glibc-profile-2.2.4-32.8.ia64.rpm b17a6bdc87d729cd39b767694cdb8a26
        nscd-2.2.4-32.8.ia64.rpm 74d03cd22fe036b2f181d3f6528b97fa
        
        Red Hat Enterprise Linux ES (v. 2.1)
        --------------------------------------------------------------------------------
        
        SRPMS:
        glibc-2.2.4-32.8.src.rpm 779b9371ed6f3df44413d43439aedcdb
        
        i386:
        glibc-2.2.4-32.8.i386.rpm a45f96f4d14dc6a7411699dae7929c2b
        glibc-common-2.2.4-32.8.i386.rpm 4307ee9036a34fc75ac369b54560e8b8
        glibc-devel-2.2.4-32.8.i386.rpm d2a171dc3f0e406acb3089edc70add67
        glibc-profile-2.2.4-32.8.i386.rpm ed1d806491ef9bc28f435a7e6c8c8392
        nscd-2.2.4-32.8.i386.rpm 7ada51ed827ebc1091f05c83186f0597
        
        i686:
        glibc-2.2.4-32.8.i686.rpm ef0c8b62114ffdde63dafd6253c7e9d1
        
        Red Hat Enterprise Linux WS (v. 2.1)
        --------------------------------------------------------------------------------
        
        SRPMS:
        glibc-2.2.4-32.8.src.rpm 779b9371ed6f3df44413d43439aedcdb
        
        i386:
        glibc-2.2.4-32.8.i386.rpm a45f96f4d14dc6a7411699dae7929c2b
        glibc-common-2.2.4-32.8.i386.rpm 4307ee9036a34fc75ac369b54560e8b8
        glibc-devel-2.2.4-32.8.i386.rpm d2a171dc3f0e406acb3089edc70add67
        glibc-profile-2.2.4-32.8.i386.rpm ed1d806491ef9bc28f435a7e6c8c8392
        nscd-2.2.4-32.8.i386.rpm 7ada51ed827ebc1091f05c83186f0597
        
        i686:
        glibc-2.2.4-32.8.i686.rpm ef0c8b62114ffdde63dafd6253c7e9d1
        
        Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
        --------------------------------------------------------------------------------
        
        SRPMS:
        glibc-2.2.4-32.8.src.rpm 779b9371ed6f3df44413d43439aedcdb
        
        ia64:
        glibc-2.2.4-32.8.ia64.rpm 3001471f06cdeb6dbe12a2dca31401a5
        glibc-common-2.2.4-32.8.ia64.rpm 55f60657c2b2f320e2393f6441de56a2
        glibc-devel-2.2.4-32.8.ia64.rpm 6e359bee323035b993214b6bfb89e903
        glibc-profile-2.2.4-32.8.ia64.rpm b17a6bdc87d729cd39b767694cdb8a26
        nscd-2.2.4-32.8.ia64.rpm 74d03cd22fe036b2f181d3f6528b97fa
        上述包可以在如下地址获得:
        
        http://rhn.redhat.com/

- 漏洞信息

9366
GNU C Library (glibc) getgrouplist Local Overflow
Local Access Required Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2003-08-14 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Glibc Getgrouplist Function Buffer Overrun Vulnerability
Boundary Condition Error 8477
No No
2003-08-23 12:00:00 2009-07-11 11:56:00
Announced by Red Hat.

- 受影响的程序版本

SGI ProPack 2.3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
GNU glibc 2.3.2
+ Conectiva Linux 9.0
+ RedHat Linux 9.0 i386
+ RedHat Linux 8.0
+ Trustix Secure Linux 2.0
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
GNU glibc 2.3.1
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Slackware Linux 9.0
GNU glibc 2.2.5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Gentoo Linux 0.7
+ Gentoo Linux 0.5
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ Slackware Linux 8.1
GNU glibc 2.2.4
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Conectiva Linux 8.0
+ HP Secure OS software for Linux 1.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i686
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alphaev6
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 alphaev6
+ RedHat Linux 7.0 i686
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux Advanced Work Station 2.1
+ S.u.S.E. Linux 8.0 i386
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux 7.3
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Enterprise Server for S/390
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. SuSE eMail Server III
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
+ SuSE SUSE Linux Enterprise Server 7

- 漏洞讨论

The glibc getgrouplist function is prone to a buffer overflow. If a user is a member of more groups than the group list can hold, the buffer will be overrun. Consequences of this vulnerability are dependant on the application calling the function.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Red Hat has released an advisory (RHSA-2003:249-11) and fixes to address this issue. Fixes are available from the Red Hat Network.

Conectiva has released a security advisory (CLSA-2003:762) and fixes to address this issue. Information on how to obtain and add fixes can be found in the attached advisory.

Red Hat has released a security advisory (RHSA-2003:325-01) containing fixes to address this and a separate issue. Users are advised to upgrade as soon as possible. Further information can be found in the attached advisory.

*** November 13, 2003 - An updated versions of the above advisory has been released containing revised fixes for Red Hat 9. Users are advised to upgrade to the latest fixes.

Trustix has released a security advisory (TSLSA-2003-0039) to address this issue. Users are advised to upgrade as soon as possible.

Mandrake has released advisory MDKSA-2003:107 to address this issue. See referenced advisory for additional details.

It is recommended that all Gentoo Linux users update their systems as
follows:

emerge sync
emerge '>=sys-libs/glibc-2.2.5'
emerge clean

Sun has released fixes for Sun Linux.

SGI has released an advisory (20031103-01-U) pertaining to their ProPack Linux distribution. The advisory has been released in response to a number of RHSA advisories, and includes a patch (Patch 10033) containing updated RPM packages relating to a number of different BIDS.

Patch 10033 can be obtained via the following link:
http://support.sgi.com/

For information regarding how to obtain individual RPM packages included in Patch 10033, please see the attached advisory.

TurboLinux has released an advisory, and made fixes for this issue available. Affected users are advised to execute one of the following commands:

# turbopkg

OR

# zabom update glibc glibc-devel glibc-profile mtrace nscd

Additional TurboLinux information is available in the referenced advisory.

Fixes:


GNU glibc 2.2.4

GNU glibc 2.2.5

GNU glibc 2.3.1

GNU glibc 2.3.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站