CVE-2004-0231
CVSS2.1
发布时间 :2004-08-18 00:00:00
修订时间 :2008-09-10 15:25:33
NMCO    

[原文]Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."


[CNNVD]Midnight Commander多个未明安全漏洞(CNNVD-200408-140)

        
        Midnight Commander是一款强大的GNU/LINUX系统的文件管理器。
        Midnight Commander存在多个未明漏洞,远程攻击者可以利用这些漏洞进行缓冲区溢出,进行符号连接攻击及拒绝服务等攻击。
        Midnight Commander存在缓冲区溢出,不安全建立文件和目录及格式串问题,目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:gentoo:linux:1.2Gentoo Linux 1.2
cpe:/o:gentoo:linux:1.4:rc1Gentoo Linux 1.4 rc1
cpe:/o:slackware:slackware_linux
cpe:/o:gentoo:linux:0.5
cpe:/a:midnight_commander:midnight_commander:4.5.48
cpe:/a:midnight_commander:midnight_commander:4.5.52
cpe:/o:gentoo:linux:1.4:rc3Gentoo Linux 1.4 rc3
cpe:/o:gentoo:linux:0.7
cpe:/a:midnight_commander:midnight_commander:4.5.45
cpe:/a:sgi:propack:2.4SGI ProPack 2.4
cpe:/a:midnight_commander:midnight_commander:4.6
cpe:/o:slackware:slackware_linux:9.0Slackware Linux 9.0
cpe:/a:midnight_commander:midnight_commander:4.5.50
cpe:/a:midnight_commander:midnight_commander:4.5.40
cpe:/a:midnight_commander:midnight_commander:4.5.46
cpe:/a:midnight_commander:midnight_commander:4.5.43
cpe:/a:midnight_commander:midnight_commander:4.5.42
cpe:/o:gentoo:linux:1.4:rc2Gentoo Linux 1.4 rc2
cpe:/a:midnight_commander:midnight_commander:4.5.55
cpe:/a:midnight_commander:midnight_commander:4.5.51
cpe:/o:slackware:slackware_linux:9.1Slackware Linux 9.1
cpe:/a:midnight_commander:midnight_commander:4.5.47
cpe:/o:gentoo:linux:1.1a
cpe:/o:gentoo:linux:1.4Gentoo Linux 1.4
cpe:/a:midnight_commander:midnight_commander:4.5.49
cpe:/a:midnight_commander:midnight_commander:4.5.41
cpe:/a:midnight_commander:midnight_commander:4.5.44
cpe:/a:sgi:propack:2.3SGI ProPack 2.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0231
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0231
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-140
(官方数据源) CNNVD

- 其它链接及资源

http://www.debian.org/security/2004/dsa-497
(VENDOR_ADVISORY)  DEBIAN  DSA-497
http://xforce.iss.net/xforce/xfdb/16020
(VENDOR_ADVISORY)  XF  midnight-commander-insecure-files(16020)
http://www.redhat.com/support/errata/RHSA-2004-172.html
(UNKNOWN)  REDHAT  RHSA-2004:172
http://www.novell.com/linux/security/advisories/2004_12_mc.html
(UNKNOWN)  SUSE  SuSE-SA:2004:012
http://security.gentoo.org/glsa/glsa-200405-21.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200405-21
http://www.mandriva.com/security/advisories?name=MDKSA-2004:039
(UNKNOWN)  MANDRAKE  MDKSA-2004:039

- 漏洞信息

Midnight Commander多个未明安全漏洞
低危 未知
2004-08-18 00:00:00 2005-10-20 00:00:00
本地  
        
        Midnight Commander是一款强大的GNU/LINUX系统的文件管理器。
        Midnight Commander存在多个未明漏洞,远程攻击者可以利用这些漏洞进行缓冲区溢出,进行符号连接攻击及拒绝服务等攻击。
        Midnight Commander存在缓冲区溢出,不安全建立文件和目录及格式串问题,目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2004/dsa-497

        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:039)以及相应补丁:
        MDKSA-2004:039:Updated mc packages fix vulnerabilities
        链接:
        http://www.linux-mandrake.com/en/security/2004/2004-039.php

        补丁下载:
        Updated Packages:
        Mandrakelinux 10.0:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/mc-4.6.0-6.1.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/SRPMS/mc-4.6.0-6.1.100mdk.src.rpm
        Corporate Server 2.1:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/mc-4.6.0-4.2.C21mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/SRPMS/mc-4.6.0-4.2.C21mdk.src.rpm
        Corporate Server 2.1/x86_64:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/RPMS/mc-4.6.0-4.2.C21mdk.x86_64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/SRPMS/mc-4.6.0-4.2.C21mdk.src.rpm
        Mandrakelinux 9.1:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.1/RPMS/mc-4.6.0-4.2.91mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.1/SRPMS/mc-4.6.0-4.2.91mdk.src.rpm
        Mandrakelinux 9.1/PPC:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/9.1/RPMS/mc-4.6.0-4.2.91mdk.ppc.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/9.1/SRPMS/mc-4.6.0-4.2.91mdk.src.rpm
        Mandrakelinux 9.2:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/mc-4.6.0-4.2.92mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/SRPMS/mc-4.6.0-4.2.92mdk.src.rpm
        Mandrakelinux 9.2/AMD64:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/mc-4.6.0-4.2.92mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/SRPMS/mc-4.6.0-4.2.92mdk.src.rpm
        上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
        
        http://www.mandrakesecure.net/en/ftp.php

        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2004:173-00)以及相应补丁:
        RHSA-2004:173-00:Updated mc packages resolve several vulnerabilities
        链接:https://www.redhat.com/support/errata/RHSA-2004-173.html
        补丁下载:
        Fedora Upgrade mc-4.6.0-14.10.i386.rpm
        
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/i386/mc-4.6.0-14.10.i386.rpm

        Fedora Upgrade mc-debuginfo-4.6.0-14.10.i386.rpm
        
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/i386/debug/mc-debuginfo-4.6.0-14.10.i386.rpm

        Fedora Upgrade mc-4.6.0-14.10.x86_64.rpm
        
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/x86_64/mc-4.6.0-14.10.x86_64.rpm

        Fedora Upgrade mc-debuginfo-4.6.0-14.10.x86_64.rpm
        
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/x86_64/debug/mc-debuginfo-4.6.0-14.10.x86_64.rpm

- 漏洞信息

5721
Midnight Commander Insecure Temporary File Creation
Local Access Required Race Condition
Loss of Integrity

- 漏洞描述

GNU Midnight Commander contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to insecure temporary file and directory creations. This flaw may lead to a loss of integrity. No further details are available.

- 时间线

2004-04-30 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, linux vendors Debian, Gentoo, Mandrake, SuSE and Red Hat have released patches to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站