发布时间 :2004-12-06 00:00:00
修订时间 :2017-07-10 21:30:10

[原文]Buffer overflow in cgi.c in www-sql before 0.5.7 allows local users to execute arbitrary code via a web page that is processed by www-sql.

[CNNVD]WWW-SQL Include命令远程缓冲区溢出漏洞(CNNVD-200412-038)


- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  10577
(UNKNOWN)  XF  wwwsql-cgi-command-execution(16455)

- 漏洞信息

WWW-SQL Include命令远程缓冲区溢出漏洞
危急 边界条件错误
2004-12-06 00:00:00 2005-10-20 00:00:00

- 公告与补丁

        Debian GNU/Linux 3.0 alias woody
        - --------------------------------
         Source archives:

         Size/MD5 checksum: 623 830be25aad38186b4178ce5ff424d796

         Size/MD5 checksum: 5651 17f259d168cb7d620c125d5d7cc3a311

         Size/MD5 checksum: 144332 96aaae705c711c4af723c6646a48c301
         Alpha architecture:

         Size/MD5 checksum: 47508 453ee924cde1a11376a4502995670e8e

         Size/MD5 checksum: 48472 e1652f6b7d2454a7e1288874821a09e1
         ARM architecture:

         Size/MD5 checksum: 42002 4254ca5e05d673c1d73c4f9ed73ed126

         Size/MD5 checksum: 42338 404e674c59182c200b9693d80289b752
         Intel IA-32 architecture:

         Size/MD5 checksum: 41446 28de214d36809a8ed88484d65a290619

         Size/MD5 checksum: 41798 3cdd4a39f99a88b4ee868c7be8e051fc
         Intel IA-64 architecture:

         Size/MD5 checksum: 53050 8d8caceeb1843afef110dba1f94f91bb

         Size/MD5 checksum: 53524 b5e42ce7363e4617fe88a05fc1dd048e
         HP Precision architecture:

         Size/MD5 checksum: 45330 a0da3671f82ebd5c4dac0ff894463021

         Size/MD5 checksum: 45796 6729114cc8e92fa1b278ccf619370f50
         Motorola 680x0 architecture:

         Size/MD5 checksum: 40222 0af8912f6629243e49f71b520c9522c1

         Size/MD5 checksum: 40542 edb269316ec27e7f73bb801e0bb74c00
         Big endian MIPS architecture:

         Size/MD5 checksum: 45190 eba2210f7bbfb019d7a4dacb40e69460

         Size/MD5 checksum: 45438 ee92959d93a961dcd431a7b917677aef
         Little endian MIPS architecture:

         Size/MD5 checksum: 45154 409d7105da9c8ad1f6058d5ac9afa3e1

         Size/MD5 checksum: 45396 3c546d9fb0bd4a8e9d7cf49170548025
         PowerPC architecture:

         Size/MD5 checksum: 43308 c28b6434bd49223dad7d0b66dfcadc2b

         Size/MD5 checksum: 43590 99ac9c623aeca76c3ff11c5396dc0cd6
         IBM S/390 architecture:


- 漏洞信息

WWW-SQL File Include Overflow
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

A local overflow exists in WWW-SQL. The WWW-SQL parser fails to check the length of the file include command resulting in a stack overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2004-06-21 Unknow
2004-06-21 Unknow

- 解决方案

Currently, there are no known official upgrades to correct this issue. However, Debian has fixed the flaw in their 0.5.7-17 package and Ulf Härnhammar has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

WWW-SQL Include Command Buffer Overflow Vulnerability
Boundary Condition Error 10577
Yes Yes
2004-06-21 12:00:00 2009-07-12 05:16:00
Discovery of this issue is credited to Ulf Harnhammar <>.

- 受影响的程序版本

James Henstridge www-sql 0.5.7

- 漏洞讨论

www-sql is reportedly vulnerable to a buffer overflow vulnerability in its include command implementation. This issue arises due to a failure of the affected application to properly handle user-supplied strings when copying them into finite stack-based buffers.

An attacker can leverage this issue to manipulate process memory; by supplying program code as well as a specially selected memory address an attacker gain control of the processes execution flow allowing for arbitrary code execution.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Debian Linux has released security advisory DSA 523-1 dealing with this issue. Please see the referenced advisory for more information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考