CVE-2003-0775
CVSS5.0
发布时间 :2003-09-22 00:00:00
修订时间 :2008-09-10 15:20:25
NMCOS    

[原文]saned in sane-backends 1.0.7 and earlier calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote attackers to cause a denial of service (memory consumption or crash).


[CNNVD]SANE字符串内存配置服务拒绝漏洞(CNNVD-200309-033)

        sane-backends 1.0.7及其早期版本的saned以任意size值调用分配内存,而该size值在发送之前已经放弃连接。远程攻击者借助该漏洞导致服务拒绝(内存消耗或者崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sane:sane:1.0.8
cpe:/a:sane:sane-backend:1.0.10
cpe:/a:sane:sane:1.0.7_beta2
cpe:/a:sane:sane:1.0.7
cpe:/a:sane:sane:1.0.6
cpe:/a:sane:sane:1.0.9
cpe:/a:sane:sane:1.0.5
cpe:/a:sane:sane:1.0.2
cpe:/a:sane:sane:1.0.3
cpe:/a:sane:sane:1.0.1
cpe:/a:sane:sane:1.0.4
cpe:/a:sane:sane:1.0.7_beta1
cpe:/a:sane:sane:1.0.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0775
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0775
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200309-033
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/8600
(VENDOR_ADVISORY)  BID  8600
http://www.redhat.com/support/errata/RHSA-2003-278.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:278
http://www.debian.org/security/2003/dsa-379
(VENDOR_ADVISORY)  DEBIAN  DSA-379
http://www.redhat.com/support/errata/RHSA-2003-285.html
(UNKNOWN)  REDHAT  RHSA-2003:285
http://www.novell.com/linux/security/advisories/2003_046_sane.html
(UNKNOWN)  SUSE  SuSE-SA:2003:046
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-005.0/CSSA-2004-005.0.txt
(UNKNOWN)  SCO  CSSA-2004-005.0
http://www.securityfocus.com/bid/8593
(UNKNOWN)  BID  8593
http://www.mandriva.com/security/advisories?name=MDKSA-2003:099
(UNKNOWN)  MANDRAKE  MDKSA-2003:099

- 漏洞信息

SANE字符串内存配置服务拒绝漏洞
中危 其他
2003-09-22 00:00:00 2005-10-20 00:00:00
远程  
        sane-backends 1.0.7及其早期版本的saned以任意size值调用分配内存,而该size值在发送之前已经放弃连接。远程攻击者借助该漏洞导致服务拒绝(内存消耗或者崩溃)。

- 公告与补丁

        The Sane project has released a new version to address this issue.
        SuSE Linux has released a security advisory (SuSE-SA:2003:046) and fixes to address this issue. Users who are potentially affected by this vulnerability are advised to apply appropriate fixes as soon as possible. Please see the referenced advisory for additional details regarding the application of applicable fixes. Fixes are linked below.
        Debian has released an advisory (DSA 379-1) containing fixes. Please see reference advisory for more details.
        Red Hat has released advisory RHSA-2003:285-03 to address this issue.
        Mandrake has released an advisory (MDKSA-2003:099) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        Conectiva Linux has released an advisory (CLA-2003:769) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        SGI has released an advisory (20031002-01-U) pertaining to their ProPack Linux distribution. The advisory has been released in response to a number of RHSA advisories, and includes a patch (Patch 10027) containing updated RPM packages relating to 22 different BIDS.
        Patch 10027 can be obtained via the following link:
        http://support.sgi.com/
        For information regarding how to obtain individual RPM packages included in Patch 10027, please see the attached advisory.
        SCO has released an advisory (CSSA-2004-005.0) and fixes to address this issue for OpenLinux. See the referenced advisory for links to fixes.
        Red Hat has released an advisory (RHBA-2004:043-01) to obsolete Red Hat 9 fixes previously released with the RHSA-2003:278-01 advisory. Affected users are advised to apply the fixes as soon as possible. Further details regarding obtaining and applying relevant fixes is available in the referenced advisory.
        SANE SANE 1.0 .0
        
        SANE SANE 1.0.1
        
        SANE sane-backend 1.0.10
        
        SANE SANE 1.0.2
        
        SANE SANE 1.0.3
        
        SANE SANE 1.0.4
        
        SANE SANE 1.0.5
        
        SANE SANE 1.0.6
        
        SANE SANE 1.0.7 -beta2
        
        SANE SANE 1.0.7
        

- 漏洞信息

11777
sane-backends saned Malloc Arbitrary Size DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-09-11 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SANE Strings Memory Allocation Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 8600
Yes No
2003-02-09 12:00:00 2009-07-11 11:56:00
Discovery credited to Alexander Hvostov, Julien Blache, and Aurelien Jarno.

- 受影响的程序版本

SGI ProPack 2.3
SGI ProPack 2.2.1
SANE sane-backend 1.0.10
SANE SANE 1.0.9
SANE SANE 1.0.8
+ S.u.S.E. Linux 8.1
SANE SANE 1.0.7 -beta2
SANE SANE 1.0.7 -beta1
SANE SANE 1.0.7
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
+ S.u.S.E. Linux 8.0
SANE SANE 1.0.6
SANE SANE 1.0.5
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3
SANE SANE 1.0.4
SANE SANE 1.0.3
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
SANE SANE 1.0.2
SANE SANE 1.0.1
SANE SANE 1.0 .0
RedHat sane-devel-1.0.3-10.pseries.rpm
+ RedHat Linux 7.1 pseries
RedHat sane-devel-1.0.3-10.iseries.rpm
+ RedHat Linux 7.1 iseries
RedHat sane-devel-1.0.3-10.i386.rpm
+ RedHat Linux 7.1 i386
RedHat sane-backends-devel-1.0.8-5.i386.rpm
+ RedHat Linux 8.0 i386
RedHat sane-backends-devel-1.0.7-6.i386.rpm
+ RedHat Linux 7.3 i386
RedHat sane-backends-devel-1.0.5-4.ia64.rpm
+ RedHat Linux 7.2 ia64
RedHat sane-backends-devel-1.0.5-4.i386.rpm
+ RedHat Linux 7.2 i386
RedHat sane-backends-1.0.8-5.i386.rpm
+ RedHat Linux 8.0 i386
RedHat sane-backends-1.0.7-6.i386.rpm
+ RedHat Linux 7.3 i386
RedHat sane-backends-1.0.5-4.ia64.rpm
+ RedHat Linux 7.2 ia64
RedHat sane-backends-1.0.5-4.i386.rpm
+ RedHat Linux 7.2 i386
RedHat sane-1.0.3-10.pseries.rpm
+ RedHat Linux 7.1 pseries
RedHat sane-1.0.3-10.iseries.rpm
+ RedHat Linux 7.1 iseries
RedHat sane-1.0.3-10.i386.rpm
+ RedHat Linux 7.1 i386
SANE sane-backend 1.0.11

- 不受影响的程序版本

SANE sane-backend 1.0.11

- 漏洞讨论

SANE is prone to a memory management vulnerability that may potentially cause a denial of service. This could occur when saned is running as a service, for example, through a super-server such as inetd or xinetd. saned may incorrectly allocate memory when a connection is dropped when string input is expected. This could result in too much memory being allocated or a failure in the malloc operation.

It is not known if an attacker could exploit this issue to corrupt memory with attacker-supplied values, though this could make it theoretically possible to execute arbitrary code.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The Sane project has released a new version to address this issue.

SuSE Linux has released a security advisory (SuSE-SA:2003:046) and fixes to address this issue. Users who are potentially affected by this vulnerability are advised to apply appropriate fixes as soon as possible. Please see the referenced advisory for additional details regarding the application of applicable fixes. Fixes are linked below.

Debian has released an advisory (DSA 379-1) containing fixes. Please see reference advisory for more details.

Red Hat has released advisory RHSA-2003:285-03 to address this issue.

Mandrake has released an advisory (MDKSA-2003:099) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

Conectiva Linux has released an advisory (CLA-2003:769) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

SGI has released an advisory (20031002-01-U) pertaining to their ProPack Linux distribution. The advisory has been released in response to a number of RHSA advisories, and includes a patch (Patch 10027) containing updated RPM packages relating to 22 different BIDS.

Patch 10027 can be obtained via the following link:
http://support.sgi.com/

For information regarding how to obtain individual RPM packages included in Patch 10027, please see the attached advisory.

SCO has released an advisory (CSSA-2004-005.0) and fixes to address this issue for OpenLinux. See the referenced advisory for links to fixes.

Red Hat has released an advisory (RHBA-2004:043-01) to obsolete Red Hat 9 fixes previously released with the RHSA-2003:278-01 advisory. Affected users are advised to apply the fixes as soon as possible. Further details regarding obtaining and applying relevant fixes is available in the referenced advisory.


SANE SANE 1.0 .0

SANE SANE 1.0.1

SANE sane-backend 1.0.10

SANE SANE 1.0.2

SANE SANE 1.0.3

SANE SANE 1.0.4

SANE SANE 1.0.5

SANE SANE 1.0.6

SANE SANE 1.0.7 -beta2

SANE SANE 1.0.7

SANE SANE 1.0.7 -beta1

SANE SANE 1.0.8

SANE SANE 1.0.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站