CVE-2004-0688
CVSS7.5
发布时间 :2004-10-20 00:00:00
修订时间 :2016-10-17 22:47:53
NMCO    

[原文]Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.


[CNNVD]LibXpm图象解码多个缓冲区溢出漏洞(CNNVD-200410-062)

        
        libXpm是一款对XPM进行解码的库系统。
        libXpm多处不正确检查边界缓冲区长度,远程攻击者可以利用这个漏洞可能以用户进程权限执行任意指令。
        问题一是xpmParseColors (parse.c)中的堆栈缓冲区溢出:
        XPMv1和XPMv2/3解析代码中不安全使用strcat(),可导致缓冲区溢出。
        第二个问题是xpmParseColors (parse.c)中分配colorTable存在整数溢出问题,问题存在于如下:
        colorTable = (XpmColor *) XpmCalloc(ncolors, sizeof(XpmColor));
        ncolors可来自不可信的XPM文件。
        第三个问题是ParseAndPutPixels (create.c)读取象素时存在堆栈缓冲区溢出。
        构建恶意的XPM文件,诱使用户访问可导致以用户进程权限执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:x.org:x11r6:6.7.0
cpe:/a:xfree86_project:x11r6:4.1.12
cpe:/o:openbsd:openbsd:3.4OpenBSD 3.4
cpe:/a:xfree86_project:x11r6:4.1.11
cpe:/a:xfree86_project:x11r6:4.0.3
cpe:/a:xfree86_project:x11r6:4.2.0
cpe:/o:suse:suse_linux:9.0::x86_64
cpe:/a:xfree86_project:x11r6:4.2.1
cpe:/a:xfree86_project:x11r6:4.3.0
cpe:/a:x.org:x11r6:6.8
cpe:/a:xfree86_project:x11r6:4.0.1
cpe:/a:xfree86_project:x11r6:4.1.0
cpe:/o:openbsd:openbsd:3.5OpenBSD 3.5
cpe:/a:xfree86_project:x11r6:4.2.1::errata
cpe:/o:suse:suse_linux:8.1SuSE SuSE Linux 8.1
cpe:/o:suse:suse_linux:9.0SuSE SuSE Linux 9.0
cpe:/a:xfree86_project:x11r6:4.0.2.11
cpe:/a:xfree86_project:x11r6:3.3.6
cpe:/a:xfree86_project:x11r6:4.0
cpe:/o:suse:suse_linux:8::enterprise_server
cpe:/o:suse:suse_linux:9.0::enterprise_server
cpe:/o:suse:suse_linux:8.2SuSE SuSE Linux 8.2
cpe:/o:suse:suse_linux:9.1SuSE SuSE Linux 9.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11796Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels,...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0688
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200410-062
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000924
(UNKNOWN)  CONECTIVA  CLA-2005:924
http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch
(UNKNOWN)  CONFIRM  http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch
http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
(UNKNOWN)  APPLE  APPLE-SA-2005-05-03
http://marc.info/?l=bugtraq&m=109530851323415&w=2
(UNKNOWN)  BUGTRAQ  20040915 CESA-2004-004: libXpm
http://scary.beasts.org/security/CESA-2004-003.txt
(UNKNOWN)  MISC  http://scary.beasts.org/security/CESA-2004-003.txt
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1
(UNKNOWN)  SUNALERT  57653
http://www.debian.org/security/2004/dsa-560
(UNKNOWN)  DEBIAN  DSA-560
http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml
(UNKNOWN)  GENTOO  GLSA-200409-34
http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml
(UNKNOWN)  GENTOO  GLSA-200502-07
http://www.kb.cert.org/vuls/id/537878
(UNKNOWN)  CERT-VN  VU#537878
http://www.mandriva.com/security/advisories?name=MDKSA-2004:098
(UNKNOWN)  MANDRAKE  MDKSA-2004:098
http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html
(UNKNOWN)  SUSE  SUSE-SA:2004:034
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
(UNKNOWN)  FEDORA  FLSA-2006:152803
http://www.redhat.com/support/errata/RHSA-2004-537.html
(UNKNOWN)  REDHAT  RHSA-2004:537
http://www.redhat.com/support/errata/RHSA-2005-004.html
(UNKNOWN)  REDHAT  RHSA-2005:004
http://www.securityfocus.com/archive/1/archive/1/434715/100/0/threaded
(UNKNOWN)  HP  SSRT4848
http://www.securityfocus.com/bid/11196
(VENDOR_ADVISORY)  BID  11196
http://www.ubuntulinux.org/support/documentation/usn/usn-27-1
(UNKNOWN)  UBUNTU  USN-27-1
http://www.us-cert.gov/cas/techalerts/TA05-136A.html
(UNKNOWN)  CERT  TA05-136A
http://www.vupen.com/english/advisories/2006/1914
(UNKNOWN)  VUPEN  ADV-2006-1914
http://xforce.iss.net/xforce/xfdb/17416
(VENDOR_ADVISORY)  XF  libxpm-xpmfile-integer-overflow(17416)

- 漏洞信息

LibXpm图象解码多个缓冲区溢出漏洞
高危 边界条件错误
2004-10-20 00:00:00 2005-10-20 00:00:00
远程  
        
        libXpm是一款对XPM进行解码的库系统。
        libXpm多处不正确检查边界缓冲区长度,远程攻击者可以利用这个漏洞可能以用户进程权限执行任意指令。
        问题一是xpmParseColors (parse.c)中的堆栈缓冲区溢出:
        XPMv1和XPMv2/3解析代码中不安全使用strcat(),可导致缓冲区溢出。
        第二个问题是xpmParseColors (parse.c)中分配colorTable存在整数溢出问题,问题存在于如下:
        colorTable = (XpmColor *) XpmCalloc(ncolors, sizeof(XpmColor));
        ncolors可来自不可信的XPM文件。
        第三个问题是ParseAndPutPixels (create.c)读取象素时存在堆栈缓冲区溢出。
        构建恶意的XPM文件,诱使用户访问可导致以用户进程权限执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2004/dsa-548

        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:099)以及相应补丁:
        MDKSA-2004:099:Updated XFree86 packages fix libXpm overflow vulnerabilities
        链接:
        http://www.linux-mandrake.com/en/security/2004/2004-099.php

        补丁下载:
        Updated Packages:
        Mandrakelinux 10.0:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libxfree86-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libxfree86-devel-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libxfree86-static-devel-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-100dpi-fonts-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-75dpi-fonts-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-doc-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-glide-module-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-server-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-xfs-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-Xnest-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/XFree86-Xvfb-4.3-32.2.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/SRPMS/XFree86-4.3-32.2.100mdk.src.rpm
        Mandrakelinux 10.0/AMD64:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/SRPMS/XFree86-4.3-32.2.100mdk.src.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64xfree86-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64xfree86-devel-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64xfree86-static-devel-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-100dpi-fonts-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-75dpi-fonts-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-doc-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-server-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-xfs-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-Xnest-4.3-32.2.100mdk.amd64.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/XFree86-Xvfb-4.3-32.2.100mdk.amd64.rpm
        Corporate Server 2.1:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/XFree86-100dpi-fonts-4.2.1-6.10.C21mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/XFree86-4.2.1-6.10.C21mdk.i586.rpm
        

- 漏洞信息

10026
libXpm ParseAndPutPixels Function Integer Overflow
Local Access Required Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Unknown

- 漏洞描述

A local overflow exists in libXpm. The ParseAndPutPixels function fails to validate user-supplied input resulting in an integer overflow. With a specially crafted request, a malicious user can cause a denial of service resulting in a loss of availability.

- 时间线

2004-09-15 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 6.8.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站