CVE-2003-0966
CVSS7.5
发布时间 :2004-02-17 00:00:00
修订时间 :2008-09-05 16:35:40
NMCOS    

[原文]Buffer overflow in the frm command in elm 2.5.6 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code via a long Subject line.


[CNNVD]ELM frm命令远程缓冲区溢出漏洞(CNNVD-200402-055)

        
        Elm是一款终端模式EMAIL用户代理。
        Elm包含frm命令在处理主题行时缺少充分缓冲区检查,远程攻击者可以利用这个漏洞构建恶意邮件,进行缓冲区溢出攻击,可能以用户进程权限在系统上执行任意指令。
        攻击者只要提交包含超长标题栏数据的邮件消息,当frm处理时就可以触发漏洞,精心构建标题栏数据可能以用户进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0966
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0966
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200402-055
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/9430
(VENDOR_ADVISORY)  BID  9430
http://www.redhat.com/support/errata/RHSA-2004-009.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:009
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=112078
(UNKNOWN)  MISC  http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=112078
http://xforce.iss.net/xforce/xfdb/14840
(UNKNOWN)  XF  elm-frm-subject-bo(14840)
ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc
(UNKNOWN)  SGI  20040103-01-U

- 漏洞信息

ELM frm命令远程缓冲区溢出漏洞
高危 边界条件错误
2004-02-17 00:00:00 2005-12-06 00:00:00
远程  
        
        Elm是一款终端模式EMAIL用户代理。
        Elm包含frm命令在处理主题行时缺少充分缓冲区检查,远程攻击者可以利用这个漏洞构建恶意邮件,进行缓冲区溢出攻击,可能以用户进程权限在系统上执行任意指令。
        攻击者只要提交包含超长标题栏数据的邮件消息,当frm处理时就可以触发漏洞,精心构建标题栏数据可能以用户进程权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat系统补丁下载:
        Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
        SRPMS:
        ftp://updates.redhat.com/2.1AS/en/os/SRPMS/elm-2.5.6-4.src.rpm
        i386:
        Available from Red Hat Network: elm-2.5.6-4.i386.rpm
        ia64:
        Available from Red Hat Network: elm-2.5.6-4.ia64.rpm
        Red Hat Linux Advanced Workstation 2.1:
        SRPMS:
        ftp://updates.redhat.com/2.1AW/en/os/SRPMS/elm-2.5.6-4.src.rpm
        ia64:
        Available from Red Hat Network: elm-2.5.6-4.ia64.rpm

- 漏洞信息

3530
Elm frm Command Mail Subject Line Handling Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

- 时间线

2004-01-15 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ELM frm Command Remote Buffer Overflow Vulnerability
Boundary Condition Error 9430
Yes No
2004-01-15 12:00:00 2009-07-12 02:06:00
The disclosure of this issue has been credited to phr-redhat <phr-redhat@nightsong.com..

- 受影响的程序版本

SGI ProPack 2.4
SGI ProPack 2.3
RedHat Linux Advanced Work Station 2.1
RedHat Linux Advanced Server 2.1 Update 2
RedHat Linux 7.3
RedHat Linux 7.2
RedHat Linux 2.1
Elm Development Group ELM 2.5.6
Elm Development Group ELM 2.5.5
- RedHat Linux 7.1 alpha
Elm Development Group ELM 2.5.3
- MandrakeSoft Corporate Server 1.0.1
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- Red Hat Linux 6.2
- RedHat Linux 7.1 i386
- RedHat Linux 7.1
- RedHat Linux 7.0 sparc
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 alpha
- RedHat Linux 7.0
- RedHat Linux 6.2 sparc
- RedHat Linux 6.2 i386
- RedHat Linux 6.2 alpha
Elm Development Group ELM 2.5.1
+ Slackware Linux 7.0
Elm Development Group ELM 2.5 alpha3
+ HP HP-UX 11.0
Elm Development Group ELM 2.4
- RedHat Linux 5.2 sparc
- RedHat Linux 5.2 i386
- RedHat Linux 5.2 alpha
- RedHat Linux 5.2
+ Slackware Linux 4.0
+ Slackware Linux 3.6
Elm Development Group ELM 2.3

- 漏洞讨论

It has been reported that ELM e-mail client may be prone to a remote buffer overflow vulnerability. A remote attacker may be able to cause a buffer overrun condition by sending a message with an excessively long header field. Specifically, the issue is presented if the maliciously crafted message is opened by a user via the 'frm' command.

Successful exploitation of this vulnerability may allow a remote attacker to execute arbitrary code in the context of the user.

Although unconfirmed, ELM versions 2.5.6 and prior may be vulnerable to this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

SGI has released an advisory 20040202-01-U to address this and other issues in SGI ProPack 2.4. Please see the referenced advisory for more information. Fixes are available below.

RedHat has provided fixes to address this issue in Red Hat Enterprise Linux Advanced Server version 2.1.

SGI has released an advisory 20040103-01-U with fixes to address this and other issues. Please see the referenced advisory for more information.


RedHat Linux Advanced Server 2.1 Update 2

RedHat Linux Advanced Work Station 2.1

SGI ProPack 2.3

SGI ProPack 2.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站