CVE-2004-1025
CVSS10.0
发布时间 :2005-01-10 00:00:00
修订时间 :2010-08-21 00:21:39
NMCOS    

[原文]Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.


[CNNVD]imlib 多个 缓冲区溢出漏洞(CNNVD-200501-116)

        Imlib是一个开源的图像应用库。
        imlib 1.9.14及之前版本中存在多个堆栈溢出漏洞。gkrellm和若干窗口管理器均使用该库。
        远程攻击者可利用此漏洞,通过特别构造的图像文件,导致应用程序崩溃及执行任意代码。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:enlightenment:imlib:1.9.13
cpe:/o:redhat:linux:9.0::i386
cpe:/o:gentoo:linuxGentoo Linux
cpe:/o:redhat:linux:7.3Red Hat Linux 7.3
cpe:/o:redhat:linux:7.3::i386
cpe:/o:redhat:linux:7.3::i686
cpe:/a:enlightenment:imlib:1.9.14

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10786Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attacke...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1025
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1025
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-116
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2004-651.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:651
http://www.securityfocus.com/bid/11830
(VENDOR_ADVISORY)  BID  11830
http://www.mandriva.com/security/advisories?name=MDKSA-2005:007
(UNKNOWN)  MANDRAKE  MDKSA-2005:007

- 漏洞信息

imlib 多个 缓冲区溢出漏洞
危急 缓冲区溢出
2005-01-10 00:00:00 2006-09-13 00:00:00
远程  
        Imlib是一个开源的图像应用库。
        imlib 1.9.14及之前版本中存在多个堆栈溢出漏洞。gkrellm和若干窗口管理器均使用该库。
        远程攻击者可利用此漏洞,通过特别构造的图像文件,导致应用程序崩溃及执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://ftp.gnome.org/pub/GNOME/sources/imlib/

- 漏洞信息

12843
Imlib Image Decoding Multiple Unspecified Overflows
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-12-07 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

IMLib Multiple XPM Image Decoding Buffer Overflow Vulnerabilities
Boundary Condition Error 11830
Yes No
2004-12-06 12:00:00 2009-07-12 08:07:00
Pavel Kankovsky disclosed these vulnerabilities.

- 受影响的程序版本

Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Home
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
Mandriva Linux Mandrake 9.2 amd64
Mandriva Linux Mandrake 9.2
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1
Imlib Imlib 1.9.14
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Imlib Imlib 1.9.13
+ MandrakeSoft Corporate Server 1.0.1
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Red Hat Enterprise Linux AS 3
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 3
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
Gentoo Linux

- 漏洞讨论

Multiple buffer overflow vulnerabilities are reported to exist in the IMLib library. These issues may be triggered when handling malformed XPM images.

These vulnerabilities could be exploited by a remote attacker to cause a denial of service in applications that use the vulnerable library to render images. It is also reported that these vulnerabilities may be exploited to execute code arbitrary code.

These issues may be related to BID 11084. This BID will be updated as further information is disclosed.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

SuSE Linux has released a security summary report (SUSE-SR:2005:002) that contains fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

TurboLinux has released a security announcement and fixes to address these and other vulnerabilities. Please see the referenced announcement for further information regarding obtaining and applying appropriate updates.

Mandrake has released an advisory (MDKSA-2005:007) and updates to address these and other vulnerabilities. Please see the referenced advisory for further information regarding obtaining and applying appropriate updates.

Gentoo Linux has released advisory GLSA 200412-03 to address these issues. Users of affected packages are urged to execute the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=media-libs/imlib-1.9.14-r3"
Please see the referenced advisory for further information.

RedHat Linux 7.3, and 9, as well as RedHat Enterprise Linux operating systems may have fixes available. Users of affected packages should contact their vendor for further information on obtaining fixes.

Red Hat has released advisory RHSA-2004:651-03 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

It is reported that patches originally used to create fixes for BIDs 11830 and 11837 are very likely the same. Users of affected packages should review both BIDs and apply all relevant fixes.

Debian has released advisory DSA 618-1 dealing with this and other issues. Please see the referenced advisory for more information.

Ubuntu Linux has released advisory USN-55-1 to address this, and other issues. Please see the referenced advisory for further information.


Imlib Imlib 1.9.13

Imlib Imlib 1.9.14

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站