CVE-2004-0455
CVSS10.0
发布时间 :2004-12-06 00:00:00
修订时间 :2005-10-20 00:00:00
NMCOS    

[原文]Buffer overflow in cgi.c in www-sql before 0.5.7 allows local users to execute arbitrary code via a web page that is processed by www-sql.


[CNNVD]WWW-SQL Include命令远程缓冲区溢出漏洞(CNNVD-200412-038)

        
        www-sql是一款能在HTML嵌入SQL语句,生成动态WEB页的工具。
        www-sql包含的include命令实现存在缓冲区溢出,远程攻击者可以利用这个漏洞可能以进程权限在系统上执行任意指令。
        主要问题存在于对用户提供的字符串,拷贝到堆栈缓冲区时缺少充分缓冲区边界检查,精心构建提交数据可能以进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0455
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0455
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-038
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/16455
(UNKNOWN)  XF  wwwsql-cgi-command-execution(16455)
http://www.securityfocus.com/bid/10577
(UNKNOWN)  BID  10577
http://www.debian.org/security/2004/dsa-523
(UNKNOWN)  DEBIAN  DSA-523

- 漏洞信息

WWW-SQL Include命令远程缓冲区溢出漏洞
危急 边界条件错误
2004-12-06 00:00:00 2005-10-20 00:00:00
远程※本地  
        
        www-sql是一款能在HTML嵌入SQL语句,生成动态WEB页的工具。
        www-sql包含的include命令实现存在缓冲区溢出,远程攻击者可以利用这个漏洞可能以进程权限在系统上执行任意指令。
        主要问题存在于对用户提供的字符串,拷贝到堆栈缓冲区时缺少充分缓冲区边界检查,精心构建提交数据可能以进程权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        Debian系统补丁下载:
        Debian GNU/Linux 3.0 alias woody
        - --------------------------------
         Source archives:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc

         Size/MD5 checksum: 623 830be25aad38186b4178ce5ff424d796
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz

         Size/MD5 checksum: 5651 17f259d168cb7d620c125d5d7cc3a311
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz

         Size/MD5 checksum: 144332 96aaae705c711c4af723c6646a48c301
         Alpha architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb

         Size/MD5 checksum: 47508 453ee924cde1a11376a4502995670e8e
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb

         Size/MD5 checksum: 48472 e1652f6b7d2454a7e1288874821a09e1
         ARM architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb

         Size/MD5 checksum: 42002 4254ca5e05d673c1d73c4f9ed73ed126
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb

         Size/MD5 checksum: 42338 404e674c59182c200b9693d80289b752
         Intel IA-32 architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb

         Size/MD5 checksum: 41446 28de214d36809a8ed88484d65a290619
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb

         Size/MD5 checksum: 41798 3cdd4a39f99a88b4ee868c7be8e051fc
         Intel IA-64 architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb

         Size/MD5 checksum: 53050 8d8caceeb1843afef110dba1f94f91bb
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb

         Size/MD5 checksum: 53524 b5e42ce7363e4617fe88a05fc1dd048e
         HP Precision architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb

         Size/MD5 checksum: 45330 a0da3671f82ebd5c4dac0ff894463021
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb

         Size/MD5 checksum: 45796 6729114cc8e92fa1b278ccf619370f50
         Motorola 680x0 architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb

         Size/MD5 checksum: 40222 0af8912f6629243e49f71b520c9522c1
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb

         Size/MD5 checksum: 40542 edb269316ec27e7f73bb801e0bb74c00
         Big endian MIPS architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb

         Size/MD5 checksum: 45190 eba2210f7bbfb019d7a4dacb40e69460
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb

         Size/MD5 checksum: 45438 ee92959d93a961dcd431a7b917677aef
         Little endian MIPS architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb

         Size/MD5 checksum: 45154 409d7105da9c8ad1f6058d5ac9afa3e1
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb

         Size/MD5 checksum: 45396 3c546d9fb0bd4a8e9d7cf49170548025
         PowerPC architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb

         Size/MD5 checksum: 43308 c28b6434bd49223dad7d0b66dfcadc2b
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb

         Size/MD5 checksum: 43590 99ac9c623aeca76c3ff11c5396dc0cd6
         IBM S/390 architecture:
        
        http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb

         S

- 漏洞信息

7192
WWW-SQL File Include Overflow
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

A local overflow exists in WWW-SQL. The WWW-SQL parser fails to check the length of the file include command resulting in a stack overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2004-06-21 Unknow
2004-06-21 Unknow

- 解决方案

Currently, there are no known official upgrades to correct this issue. However, Debian has fixed the flaw in their 0.5.7-17 package and Ulf Härnhammar has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

WWW-SQL Include Command Buffer Overflow Vulnerability
Boundary Condition Error 10577
Yes Yes
2004-06-21 12:00:00 2009-07-12 05:16:00
Discovery of this issue is credited to Ulf Harnhammar <Ulf.Harnhammar.9485@student.uu.se>.

- 受影响的程序版本

James Henstridge www-sql 0.5.7

- 漏洞讨论

www-sql is reportedly vulnerable to a buffer overflow vulnerability in its include command implementation. This issue arises due to a failure of the affected application to properly handle user-supplied strings when copying them into finite stack-based buffers.

An attacker can leverage this issue to manipulate process memory; by supplying program code as well as a specially selected memory address an attacker gain control of the processes execution flow allowing for arbitrary code execution.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian Linux has released security advisory DSA 523-1 dealing with this issue. Please see the referenced advisory for more information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站