CVE-2003-0924
CVSS3.7
发布时间 :2004-02-17 00:00:00
修订时间 :2008-09-05 16:35:34
NMCOS    

[原文]netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.


[CNNVD]Netpbm本地临时文件漏洞(CNNVD-200402-074)

        
        netpbm是一款图形转换的工具。
        netpbm不安全建立临时文件,本地攻击者可以利用这个漏洞以调用此工具用户权限覆盖本地系统任意文件。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 3.7 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:810Red Hat Enterprise 3 netpbm File Overwrite Vulnerability
oval:org.mitre.oval:def:804Red Hat netpbm File Overwrite Vulnerability
oval:org.mitre.oval:def:10978netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0924
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200402-074
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/487102
(VENDOR_ADVISORY)  CERT-VN  VU#487102
http://www.redhat.com/support/errata/RHSA-2004-030.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:030
http://www.debian.org/security/2004/dsa-426
(VENDOR_ADVISORY)  DEBIAN  DSA-426
http://xforce.iss.net/xforce/xfdb/14874
(VENDOR_ADVISORY)  XF  netpbm-temp-insecure-file(14874)
http://www.securityfocus.com/bid/9442
(VENDOR_ADVISORY)  BID  9442
http://www.redhat.com/support/errata/RHSA-2004-031.html
(UNKNOWN)  REDHAT  RHSA-2004:031
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:011
(UNKNOWN)  MANDRAKE  MDKSA-2004:011
http://www.gentoo.org/security/en/glsa/glsa-200410-02.xml
(UNKNOWN)  GENTOO  GLSA-200410-02
ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc
(UNKNOWN)  SGI  20040201-01-U

- 漏洞信息

Netpbm本地临时文件漏洞
低危 竞争条件
2004-02-17 00:00:00 2006-09-21 00:00:00
本地  
        
        netpbm是一款图形转换的工具。
        netpbm不安全建立临时文件,本地攻击者可以利用这个漏洞以调用此工具用户权限覆盖本地系统任意文件。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2004/dsa-426

- 漏洞信息

10486
Netpbm pnmindex Insecure Temporary File Creation
Local Access Required Race Condition
Loss of Integrity
Exploit Public

- 漏洞描述

pnmindex, one of the netpbm utilities, contains a flaw that may allow a malicious user to overwrite arbitrary files. Due to predictable temporary file names, an attacker can create symlinks in advance to exploit this flaw. It is possible that the flaw may allow for the overwriting and/or corruption of arbitrary files by the user invoking the vulnerable applications resulting in a loss of integrity.

- 时间线

2004-01-18 Unknow
2004-01-18 Unknow

- 解决方案

Upgrade to version 10.20 or higher, as it has been reported to fix this vulnerability. If an unofficial release is in use as provided by a third party vendor, vendor upgrades should be used. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Netpbm Temporary File Vulnerabilities
Race Condition Error 9442
No Yes
2004-01-18 12:00:00 2009-07-12 02:06:00
Announced by Debian.

- 受影响的程序版本

SGI ProPack 2.4
SGI ProPack 2.3
RedHat netpbm-progs-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat netpbm-devel-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat netpbm-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1
Red Hat 6.2 traceroute 1.4 a5
+ RedHat Linux 6.2 E sparc
+ RedHat Linux 6.2 E i386
+ RedHat Linux 6.2 E alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
Netpbm Netpbm 10.14
Netpbm Netpbm 10.13
Netpbm Netpbm 10.12
Netpbm Netpbm 10.11
Netpbm Netpbm 10.10
Netpbm Netpbm 10.9
Netpbm Netpbm 10.8
Netpbm Netpbm 10.7
Netpbm Netpbm 10.6
Netpbm Netpbm 10.5
Netpbm Netpbm 10.4
Netpbm Netpbm 10.3
Netpbm Netpbm 10.2
Netpbm Netpbm 10.1
Netpbm Netpbm 10.0
Netpbm Netpbm 9.25
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0
Netpbm Netpbm 9.24
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 8.0 i686
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ Sun Linux 5.0
Netpbm Netpbm 9.23
Netpbm Netpbm 9.22
Netpbm Netpbm 9.21
Netpbm Netpbm 9.20
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Netpbm Netpbm 9.14
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i586
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 athlon
+ RedHat Linux 7.2
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 7.0
Netpbm Netpbm 9.9
+ RedHat Linux 7.1 i686
+ RedHat Linux 7.1 i586
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1
Netpbm Netpbm 9.5
+ RedHat Linux 7.0 i686
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0

- 漏洞讨论

Debian has reported that Netpbm is affected by numerous vulnerabilities related to its use of temporary files. These vulnerabilities may allow for a malicious user to cause the corruption of files owned by other users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

SGI has released an advisory 20040202-01-U to address this and other issues in SGI ProPack 2.4. Please see the referenced advisory for more information. Fixes are available below.

Red Hat has released an advisory (RHSA-2004:031-02) and fixes to address this issue in Enterprise products. Customers who are subscribed to the Red Hat Network may obtain fixes by running the up2date utility. Further information can be found in the referenced advisory.

Debian has issued fixes. See advisory DSA-426-1 in the reference section.

RedHat has released an advisory RHSA-2004:030-01 with updated NetPBM packages to address this issue. Please see the referenced advisory for more information.

SGI has released an advisory 20040201-01-U with a patch to address this and other issues. Please see the referenced advisory for more information.

Mandrake has released advisory MDKSA-2004:011 with fixes to address this issue.

Mandrake has released advisory MDKSA-2004:011-1 along with updated fixes dealing with this issue. Apparently the previous patches failed to properly implement a call to 'mktemp' causing some failures. Reportedly there are no security issues around this update; it is simply a bug fix. Please see the referenced advisory for more information.

Gentoo Linux has released an advisory (GLSA 200410-02) along with an updated dealing with this issue. Gentoo advises that all Netpbm users should upgrade to an unaffected version:

# emerge sync

# emerge -pv ">=media-libs/netpbm-10.0"
# emerge ">=media-libs/netpbm-10.0"

For more information please see the referenced Gentoo Linux advisory for more information.

Conectiva has released advisory CLA-2004:909 to address these issues. Please see the referenced advisory for more information.

Turbolinux has released advisory 20050207 [TURBOLINUX SECURITY INFO] 07/Feb/2005 to address various issues. Please see the referenced advisory for more information.


RedHat netpbm-devel-9.24-10.i386.rpm

RedHat netpbm-9.24-10.i386.rpm

RedHat netpbm-progs-9.24-10.i386.rpm

SGI ProPack 2.3

SGI ProPack 2.4

Netpbm Netpbm 9.14

Netpbm Netpbm 9.20

Netpbm Netpbm 9.24

Netpbm Netpbm 9.25

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站