CVE-2003-0778
CVSS5.0
发布时间 :2003-09-22 00:00:00
修订时间 :2008-09-10 15:20:25
NMCOS    

[原文]saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption).


[CNNVD]SANE后台程序连接用户内存消耗服务拒绝漏洞(CNNVD-200309-031)

        sane-backends 1.0.7及其早期版本的saned和可能后来的版本在某些情况不能正确配置内存。攻击者导致服务拒绝(内存消耗)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sane:sane:1.0.8
cpe:/a:sane:sane-backend:1.0.10
cpe:/a:sane:sane:1.0.7_beta2
cpe:/a:sane:sane:1.0.7
cpe:/a:sane:sane:1.0.6
cpe:/a:sane:sane:1.0.9
cpe:/a:sane:sane:1.0.5
cpe:/a:sane:sane:1.0.2
cpe:/a:sane:sane:1.0.3
cpe:/a:sane:sane:1.0.1
cpe:/a:sane:sane:1.0.4
cpe:/a:sane:sane:1.0.7_beta1
cpe:/a:sane:sane:1.0.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0778
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0778
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200309-031
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2003-278.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:278
http://www.debian.org/security/2003/dsa-379
(VENDOR_ADVISORY)  DEBIAN  DSA-379
http://www.redhat.com/support/errata/RHSA-2003-285.html
(UNKNOWN)  REDHAT  RHSA-2003:285
http://www.novell.com/linux/security/advisories/2003_046_sane.html
(UNKNOWN)  SUSE  SuSE-SA:2003:046
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-005.0/CSSA-2004-005.0.txt
(UNKNOWN)  SCO  CSSA-2004-005.0
http://www.securityfocus.com/bid/8596
(UNKNOWN)  BID  8596
http://www.securityfocus.com/bid/8593
(UNKNOWN)  BID  8593
http://www.mandriva.com/security/advisories?name=MDKSA-2003:099
(UNKNOWN)  MANDRAKE  MDKSA-2003:099

- 漏洞信息

SANE后台程序连接用户内存消耗服务拒绝漏洞
中危 设计错误
2003-09-22 00:00:00 2005-10-20 00:00:00
远程  
        sane-backends 1.0.7及其早期版本的saned和可能后来的版本在某些情况不能正确配置内存。攻击者导致服务拒绝(内存消耗)。

- 公告与补丁

        The Sane project has released a new version to address this issue.
        SuSE Linux has released a security advisory (SuSE-SA:2003:046) and fixes to address this issue. Users who are potentially affected by this vulnerability are advised to apply appropriate fixes as soon as possible. Please see the referenced advisory for additional details regarding the application of applicable fixes. Fixes are linked below.
        Red Hat has released an advisory (RHSA-2003:278-01) to address this issue. Affected users are advised to apply the fixes as soon as possible. Further details regarding obtaining and applying relevant fixes is available in the referenced advisory.
        Debian has released security advisory DSA 379-1 to address these issues. See referenced advisory for additional details.
        Red Hat advisory RHSA-2003:285-03 released to address this issue.
        Mandrake has released an advisory (MDKSA-2003:099) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        Conectiva Linux has released an advisory (CLA-2003:769) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        SGI has released an advisory (20031002-01-U) pertaining to their ProPack Linux distribution. The advisory has been released in response to a number of RHSA advisories, and includes a patch (Patch 10027) containing updated RPM packages relating to 22 different BIDS.
        Patch 10027 can be obtained via the following link:
        http://support.sgi.com/
        For information regarding how to obtain individual RPM packages included in Patch 10027, please see the attached advisory.
        SCO has released an advisory (CSSA-2004-005.0) and fixes to address this issue for OpenLinux. See the referenced advisory for links to fixes.
        SANE SANE 1.0 .0
        
        SANE SANE 1.0.1
        
        SANE sane-backend 1.0.10
        
        SANE SANE 1.0.2
        
        SANE SANE 1.0.3
        
        SANE SANE 1.0.4
        
        SANE SANE 1.0.5
        
        SANE SANE 1.0.6
        
        SANE SANE 1.0.7 -beta2
        
        SANE SANE 1.0.7
        

  •         Debian libsane-dev_1.0.7-4_alpha.deb

- 漏洞信息

11781
sane-backends saned Unspecified Memory Allocation DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-09-11 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SANE Daemon Connected User Memory Consumption Denial Of Service Vulnerability
Design Error 8596
Yes No
2003-02-09 12:00:00 2009-07-11 11:56:00
Discovery credited to Alexander Hvostov, Julien Blache, and Aurelien Jarno.

- 受影响的程序版本

SGI ProPack 2.3
SGI ProPack 2.2.1
SANE sane-backend 1.0.10
SANE SANE 1.0.9
SANE SANE 1.0.8
+ S.u.S.E. Linux 8.1
SANE SANE 1.0.7 -beta2
SANE SANE 1.0.7 -beta1
SANE SANE 1.0.7
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
+ S.u.S.E. Linux 8.0
SANE SANE 1.0.6
SANE SANE 1.0.5
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3
SANE SANE 1.0.4
SANE SANE 1.0.3
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
SANE SANE 1.0.2
SANE SANE 1.0.1
SANE SANE 1.0 .0
RedHat sane-devel-1.0.3-10.pseries.rpm
+ RedHat Linux 7.1 pseries
RedHat sane-devel-1.0.3-10.iseries.rpm
+ RedHat Linux 7.1 iseries
RedHat sane-devel-1.0.3-10.i386.rpm
+ RedHat Linux 7.1 i386
RedHat sane-backends-devel-1.0.8-5.i386.rpm
+ RedHat Linux 8.0 i386
RedHat sane-backends-devel-1.0.7-6.i386.rpm
+ RedHat Linux 7.3 i386
RedHat sane-backends-devel-1.0.5-4.ia64.rpm
+ RedHat Linux 7.2 ia64
RedHat sane-backends-devel-1.0.5-4.i386.rpm
+ RedHat Linux 7.2 i386
RedHat sane-backends-1.0.8-5.i386.rpm
+ RedHat Linux 8.0 i386
RedHat sane-backends-1.0.7-6.i386.rpm
+ RedHat Linux 7.3 i386
RedHat sane-backends-1.0.5-4.ia64.rpm
+ RedHat Linux 7.2 ia64
RedHat sane-backends-1.0.5-4.i386.rpm
+ RedHat Linux 7.2 i386
RedHat sane-1.0.3-10.pseries.rpm
+ RedHat Linux 7.1 pseries
RedHat sane-1.0.3-10.iseries.rpm
+ RedHat Linux 7.1 iseries
RedHat sane-1.0.3-10.i386.rpm
+ RedHat Linux 7.1 i386
SANE sane-backend 1.0.11

- 不受影响的程序版本

SANE sane-backend 1.0.11

- 漏洞讨论

A problem has been discovered in the handling of memory by SANE. This could be an issue if saned is running as a service, through a super-server such as inetd or xinetd. Because of this, it is possible for an attacker to deny service to legitimate users of a system by causing large amounts of memory to be allocated.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The Sane project has released a new version to address this issue.

SuSE Linux has released a security advisory (SuSE-SA:2003:046) and fixes to address this issue. Users who are potentially affected by this vulnerability are advised to apply appropriate fixes as soon as possible. Please see the referenced advisory for additional details regarding the application of applicable fixes. Fixes are linked below.

Red Hat has released an advisory (RHSA-2003:278-01) to address this issue. Affected users are advised to apply the fixes as soon as possible. Further details regarding obtaining and applying relevant fixes is available in the referenced advisory.

Debian has released security advisory DSA 379-1 to address these issues. See referenced advisory for additional details.

Red Hat advisory RHSA-2003:285-03 released to address this issue.

Mandrake has released an advisory (MDKSA-2003:099) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

Conectiva Linux has released an advisory (CLA-2003:769) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

SGI has released an advisory (20031002-01-U) pertaining to their ProPack Linux distribution. The advisory has been released in response to a number of RHSA advisories, and includes a patch (Patch 10027) containing updated RPM packages relating to 22 different BIDS.

Patch 10027 can be obtained via the following link:
http://support.sgi.com/

For information regarding how to obtain individual RPM packages included in Patch 10027, please see the attached advisory.

SCO has released an advisory (CSSA-2004-005.0) and fixes to address this issue for OpenLinux. See the referenced advisory for links to fixes.


SANE SANE 1.0 .0

SANE SANE 1.0.1

SANE sane-backend 1.0.10

SANE SANE 1.0.2

SANE SANE 1.0.3

SANE SANE 1.0.4

SANE SANE 1.0.5

SANE SANE 1.0.6

SANE SANE 1.0.7 -beta2

SANE SANE 1.0.7

SANE SANE 1.0.7 -beta1

SANE SANE 1.0.8

SANE SANE 1.0.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站