CVE-2004-0398
CVSS7.5
发布时间 :2004-07-07 00:00:00
修订时间 :2016-10-17 22:45:01
NMCOS    

[原文]Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client.


[CNNVD]Neon WebDAV客户端库ne_rfc1036_parse函数堆溢出漏洞(CNNVD-200407-026)

        
        neon是一款HTTP和WebDAV客户端库。
        Neon WebDAV客户端库不正确检查用户提供的数据,远程攻击者可以利用这个漏洞对调用库的应用程序进行基于堆的溢出。
        问题存在于ne_rfc1036_parse()函数中,提交特殊的日期字符串给ne_rfc1036_parse()可触发sscanf()字符串溢出堆中的静态变量,成功利用此漏洞可能以调用此库的应用程序进程权限执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:cadaver:cadaver_webdav_client:0.20.4
cpe:/a:cadaver:cadaver_webdav_client:0.20.5
cpe:/a:subversion:subversion
cpe:/a:neon:neon_client_library:0.19.3
cpe:/a:cadaver:cadaver_webdav_client:0.20.2
cpe:/a:cadaver:cadaver_webdav_client:0.22.0
cpe:/a:neon:neon_client_library:0.23
cpe:/a:cadaver:cadaver_webdav_client:0.20.3
cpe:/a:cadaver:cadaver_webdav_client:0.22.1
cpe:/a:neon:neon_client_library:0.23.4
cpe:/a:neon:neon_client_library:0.24.3
cpe:/a:neon:neon_client_library:0.23.3
cpe:/a:neon:neon_client_library:0.24.2
cpe:/a:cadaver:cadaver_webdav_client:0.20.0
cpe:/a:cadaver:cadaver_webdav_client:0.20.1
cpe:/a:cadaver:cadaver_webdav_client:0.21.0
cpe:/a:neon:neon_client_library:0.24
cpe:/a:neon:neon_client_library:0.23.8
cpe:/a:neon:neon_client_library:0.23.7
cpe:/a:openoffice:openoffice:1.1.2
cpe:/a:neon:neon_client_library:0.23.2
cpe:/a:neon:neon_client_library:0.24.1
cpe:/a:neon:neon_client_library:0.23.1
cpe:/a:neon:neon_client_library:0.23.6
cpe:/a:neon:neon_client_library:0.23.5
cpe:/a:neon:neon_client_library:0.24.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0398
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0398
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200407-026
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html
(VENDOR_ADVISORY)  FULLDISC  20040519 Advisory 06/2004: libneon date parsing vulnerability
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841
(VENDOR_ADVISORY)  CONECTIVA  CLA-2004:841
http://marc.info/?l=bugtraq&m=108498433632333&w=2
(UNKNOWN)  BUGTRAQ  20040519 Advisory 06/2004: libneon date parsing vulnerability
http://marc.info/?l=bugtraq&m=108500057108022&w=2
(UNKNOWN)  BUGTRAQ  20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon)
http://security.gentoo.org/glsa/glsa-200405-13.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200405-13
http://security.gentoo.org/glsa/glsa-200405-15.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200405-15
http://www.ciac.org/ciac/bulletins/o-148.shtml
(VENDOR_ADVISORY)  CIAC  O-148
http://www.debian.org/security/2004/dsa-506
(VENDOR_ADVISORY)  DEBIAN  DSA-506
http://www.debian.org/security/2004/dsa-507
(VENDOR_ADVISORY)  DEBIAN  DSA-507
http://www.mandriva.com/security/advisories?name=MDKSA-2004:049
(UNKNOWN)  MANDRAKE  MDKSA-2004:049
http://www.redhat.com/support/errata/RHSA-2004-191.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:191
http://www.securityfocus.com/bid/10385
(PATCH)  BID  10385
http://xforce.iss.net/xforce/xfdb/16192
(PATCH)  XF  neon-library-nerfc1036parse-bo(16192)
https://bugzilla.fedora.us/show_bug.cgi?id=1552
(PATCH)  FEDORA  FEDORA-2004-1552

- 漏洞信息

Neon WebDAV客户端库ne_rfc1036_parse函数堆溢出漏洞
高危 边界条件错误
2004-07-07 00:00:00 2005-10-20 00:00:00
远程  
        
        neon是一款HTTP和WebDAV客户端库。
        Neon WebDAV客户端库不正确检查用户提供的数据,远程攻击者可以利用这个漏洞对调用库的应用程序进行基于堆的溢出。
        问题存在于ne_rfc1036_parse()函数中,提交特殊的日期字符串给ne_rfc1036_parse()可触发sscanf()字符串溢出堆中的静态变量,成功利用此漏洞可能以调用此库的应用程序进程权限执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2004/dsa-507

        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:049)以及相应补丁:
        MDKSA-2004:049:Updated libneon packages fix heap variable overflow issues
        链接:
        http://www.linux-mandrake.com/en/security/2004/2004-049.php

        补丁下载:
        Updated Packages:
        Mandrakelinux 10.0:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-0.24.5-0.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-devel-0.24.5-0.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-static-devel-0.24.5-0.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/SRPMS/libneon-0.24.5-0.2.100mdk.src.rpm
        Mandrakelinux 10.0/AMD64:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-0.24.5-0.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-devel-0.24.5-0.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-static-devel-0.24.5-0.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/SRPMS/libneon-0.24.5-0.2.100mdk.src.rpm
        Mandrakelinux 9.2:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-0.24.5-0.2.92mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-devel-0.24.5-0.2.92mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-static-devel-0.24.5-0.2.92mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/SRPMS/libneon-0.24.5-0.2.92mdk.src.rpm
        Mandrakelinux 9.2/AMD64:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-0.24.5-0.2.92mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-devel-0.24.5-0.2.92mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-static-devel-0.24.5-0.2.92mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/SRPMS/libneon-0.24.5-0.2.92mdk.src.rpm
        _______________________________________________________________________
        To upgrade automatically use MandrakeUpdate or urpmi. The verification
        of md5 checksums and GPG signatures is performed automatically for you.
        A list of FTP mirrors can be obtained from:
        
        http://www.mandrakesecure.net/en/ftp.php

        上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
        
        http://www.mandrakesecure.net/en/ftp.php

        Neon
        ----
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Neon Upgrade neon-0.24.6.tar.gz
        
        http://www.webdav.org/neon/neon-0.24.6.tar.gz

- 漏洞信息

6302
cadaver libneon Date Parsing Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

A remote overflow exists in cadaver. The issue is triggered due to improper bounds checking of the neon ne_rfc1036_parse library, resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution, resulting in a loss of integrity.

- 时间线

2004-05-19 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.24.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Neon WebDAV Client Library ne_rfc1036_parse Function Heap Overflow Vulnerability
Boundary Condition Error 10385
Yes No
2004-05-19 12:00:00 2009-07-12 05:16:00
This issue was discovered by Stefan Esser <s.esser@ematters.de>.

- 受影响的程序版本

Subversion Subversion 1.0.1
+ Conectiva Linux 10.0
sitecopy sitecopy 0.13.4
sitecopy sitecopy 0.13.3
RedHat Linux 9.0 i386
RedHat Linux 7.3
OpenOffice OpenOffice 1.1.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Neon Client Library 0.24.5
Neon Client Library 0.24.4
Neon Client Library 0.24.3
Neon Client Library 0.24.2
Neon Client Library 0.24.1
Neon Client Library 0.24
Neon Client Library 0.23.8
Neon Client Library 0.23.7
Neon Client Library 0.23.6
Neon Client Library 0.23.5
Neon Client Library 0.23.4
Neon Client Library 0.23.3
Neon Client Library 0.23.2
Neon Client Library 0.23.1
Neon Client Library 0.23
Neon Client Library 0.19.3
- Debian Linux 3.0 sparc
- Debian Linux 3.0 s/390
- Debian Linux 3.0 ppc
- Debian Linux 3.0 mipsel
- Debian Linux 3.0 mips
- Debian Linux 3.0 m68k
- Debian Linux 3.0 ia-64
- Debian Linux 3.0 ia-32
- Debian Linux 3.0 hppa
- Debian Linux 3.0 arm
- Debian Linux 3.0 alpha
- Debian Linux 3.0
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
GNU Arch 1.2 pre3
GNU Arch 1.2 pre2
GNU Arch 1.2 pre1
GNU Arch 1.2 pre0
GNU Arch 1.2
GNU Arch 1.1
Gentoo Linux 1.4 _rc3
Gentoo Linux 1.4 _rc2
Gentoo Linux 1.4 _rc1
Gentoo Linux 1.4
Gentoo Linux 1.2
Gentoo Linux 1.1 a
Gentoo Linux 0.7
Gentoo Linux 0.5
Cadaver WebDAV Client 0.22.1
Cadaver WebDAV Client 0.22
+ RedHat Linux 9.0 i386
Cadaver WebDAV Client 0.21
Cadaver WebDAV Client 0.20.5
Cadaver WebDAV Client 0.20.4
Cadaver WebDAV Client 0.20.3
Cadaver WebDAV Client 0.20.2
Cadaver WebDAV Client 0.20.1
Cadaver WebDAV Client 0.20
Cadaver WebDAV Client 0.18
Neon Client Library 0.24.6

- 不受影响的程序版本

Neon Client Library 0.24.6

- 漏洞讨论

Neon WebDAV client library is prone to a heap overflow vulnerability. This issue exists due to improper boundary checks performed on user-supplied data. Reportedly a malformed string value may cause a sscanf() string overflow into static heap variables.

Neon 0.24.5 and prior are prone to this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Neon 0.24.6 has been released to address this issue.

Debian has releases an advisory DSA 506-1 to address this issue. Please see the referenced advisory for more information.

Debian has releases an advisory DSA 507-1 to address this issue in cadaver. Please see the referenced advisory for more information.

Red Hat Fedora Linux has released advisories FEDORA-2004-129 and FEDORA-2004-130 dealing with this issue for their Fedora Linux Core. Please see the referenced advisories for more information.

Mandrake Linux has released advisory MDKSA-2004:049 and fixes dealing with this issue. Please see the referenced advisory for more information.

OpenPKG has released advisory OpenPKG-SA-2004.024 and fixes dealing with this issue. Please see the referenced advisory for more information.

Gentoo Linux has released advisories GLSA 200405-13, and GLSA 200405-15 dealing with this issue. Please see the referenced advisories for more information. Users of affected packages are encouraged to run the following commands as superuser:
emerge sync
emerge -pv ">=net-misc/neon-0.24.6"
emerge ">=net-misc/neon-0.24.6"
emerge -pv ">=net-misc/cadaver-0.22.2"
emerge ">=net-misc/cadaver-0.22.2"

Conectiva Linux has released advisory CLA-2004:841 dealing with this issue. Please see the referenced advisory for more information.

Silicon Graphics has released advisory 20040508-01-U and fixes dealing with this and other issues for SGI ProPack 2.4. Please see the referenced advisory for more information.

Gentoo has released an updated advisory (GLSA 200405-25:02) providing fixes for GNU Arch (tla), which includes the vulnerable neon library. Fixes may be applied by the superuser with the following commands:
emerge sync
emerge -pv ">=dev-util/tla-1.2-r2"
emerge ">=dev-util/tla-1.2-r2"

Gentoo has released an advisory (GLSA 200406-03) providing fixes for sitecopy, which includes the vulnerable neon library. Fixes may be applied by the superuser with the following commands:
emerge -pv unmerge net-misc/sitecopy
emerge unmerge net-misc/sitecopy

Mandrake Linux has released advisory MDKSA-2004:078 addressing this issue. Please see the referenced advisory for further information.

The Fedora Legacy project has released advisory FLSA:1552 along with fixes to address this issue for RedHat Linux 7.3 and 9.0. Please see the referenced advisory for further information.


sitecopy sitecopy 0.13.3

sitecopy sitecopy 0.13.4

Cadaver WebDAV Client 0.18

Neon Client Library 0.19.3

Cadaver WebDAV Client 0.22

Cadaver WebDAV Client 0.22.1

Neon Client Library 0.23

Neon Client Library 0.23.1

Neon Client Library 0.23.2

Neon Client Library 0.23.3

Neon Client Library 0.23.4

Neon Client Library 0.23.5

Neon Client Library 0.23.6

Neon Client Library 0.23.7

Neon Client Library 0.23.8

Neon Client Library 0.24

Neon Client Library 0.24.1

Neon Client Library 0.24.2

Neon Client Library 0.24.3

Neon Client Library 0.24.4

Neon Client Library 0.24.5

OpenOffice OpenOffice 1.1.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站