CVE-2003-0852
CVSS5.0
发布时间 :2003-11-17 00:00:00
修订时间 :2008-09-10 15:20:43
NMCOS    

[原文]Format string vulnerability in send_message.c for Sylpheed-claws 0.9.4 through 0.9.6 allows remote SMTP servers to cause a denial of service (crash) in sylpheed via format strings in an error message.


[CNNVD]Sylpheed-Claws Mail客户端SMTP错误报告串处理漏洞(CNNVD-200311-060)

        
        Sylpheed-Claws Mail是一款邮件客户端软件。
        Sylpheed-Claws Mail没有正确处理服务器端返回的错误消息,远程攻击者可以利用这个漏洞对客户端进行格式串攻击。
        问题存在于Sylpheed-Claws Mail的send_message.c文件中,其中包含alertpanel_error_log(err_msg);函数,由于没有使用格式串,攻击者伪造SMTP服务器提交包含格式字符串的错误消息,当Sylpheed-Claws Mail处理时可破坏内存信息,精心构建提交数据可能以邮件程序进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sylpheed-claws:sylpheed-claws:0.9.4
cpe:/a:sylpheed-claws:sylpheed-claws:0.9.6
cpe:/a:sylpheed:sylpheed:0.9.6
cpe:/a:sylpheed-claws:sylpheed-claws:0.9.5
cpe:/a:sylpheed:sylpheed:0.9.4
cpe:/a:sylpheed:sylpheed:0.9.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0852
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0852
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200311-060
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/8877
(VENDOR_ADVISORY)  BID  8877
http://www.guninski.com/sylph.html
(UNKNOWN)  MISC  http://www.guninski.com/sylph.html
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012542.html
(UNKNOWN)  FULLDISC  20031022 Sylpheed-claws format string bug, yet still sylpheed much better than windows
http://xforce.iss.net/xforce/xfdb/13508
(UNKNOWN)  XF  sylpheed-smtp-format-string(13508)
http://sylpheed.good-day.net/#changes
(UNKNOWN)  CONFIRM  http://sylpheed.good-day.net/#changes

- 漏洞信息

Sylpheed-Claws Mail客户端SMTP错误报告串处理漏洞
中危 输入验证
2003-11-17 00:00:00 2005-10-20 00:00:00
远程  
        
        Sylpheed-Claws Mail是一款邮件客户端软件。
        Sylpheed-Claws Mail没有正确处理服务器端返回的错误消息,远程攻击者可以利用这个漏洞对客户端进行格式串攻击。
        问题存在于Sylpheed-Claws Mail的send_message.c文件中,其中包含alertpanel_error_log(err_msg);函数,由于没有使用格式串,攻击者伪造SMTP服务器提交包含格式字符串的错误消息,当Sylpheed-Claws Mail处理时可破坏内存信息,精心构建提交数据可能以邮件程序进程权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Sylpheed
        --------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Sylpheed Upgrade sylpheed-0.9.7.tar.gz
        
        http://sylpheed.good-day.net/sylpheed/sylpheed-0.9.7.tar.gz

        Sylpheed-Claws
        --------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Sylpheed-Claws Patch send_message.patch
        
        http://cvs.sourceforge.net/viewcvs.py/sylpheed-claws/sylpheed-claws/src/send_message.c?r1=1.18&r2=1.19&diff_format=u

- 漏洞信息

8332
Sylpheed-claws send_message.c Error Message Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

A remote overflow exists in Sylpheed. The send_put_error function in send_message.c does not have a format string in an error message call resulting in a format string overflow. With a specially crafted request, an attacker can cause execute arbitrary code resulting in a loss of integrity, and/or availability.

- 时间线

2003-10-03 2003-10-03
2003-10-22 Unknow

- 解决方案

Upgrade to version 0.9.7 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): apply the patch and rebuild from source

- 相关参考

- 漏洞作者

- 漏洞信息

Sylpheed-Claws Mail Client SMTP Error Reporting Format String Vulnerability
Input Validation Error 8877
Yes No
2003-10-22 12:00:00 2009-07-11 11:56:00
This vulnerability was reported by Georgi Guninski.

- 受影响的程序版本

Sylpheed-Claws Sylpheed-Claws 0.9.6 claws
Sylpheed-Claws Sylpheed-Claws 0.9.5 claws
Sylpheed-Claws Sylpheed-Claws 0.9.4 claws
Sylpheed Sylpheed 0.9.6
Sylpheed Sylpheed 0.9.5
Sylpheed Sylpheed 0.9.4
+ S.u.S.E. Linux Personal 9.3
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
Sylpheed Sylpheed 0.9.7

- 不受影响的程序版本

Sylpheed Sylpheed 0.9.7

- 漏洞讨论

A format string vulnerability has been reported for Sylpheed-Claws when displaying error messages reported by SMTP servers. As a result, a maliciously configured SMTP server designed to transmit format specifiers within error messages may be capable of corrupting memory within a users Sylpheed-Claws process. This could ultimately result in the execution of arbitrary code.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

This issue was addressed in the CVS tree on the same day the issue was reported. An updated version of Sylpheed-Claws does not appear to be available at this time, however users are advised to patch their code bases using CVS or by applying the patch supplied below.

For the stable Sylpheed mail client, this issue has been addressed in release 0.9.7. Users are advised to upgrade as soon as possible.


Sylpheed Sylpheed 0.9.4

Sylpheed Sylpheed 0.9.5

Sylpheed Sylpheed 0.9.6

Sylpheed-Claws Sylpheed-Claws 0.9.6 claws

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站