CVE-2004-1180
CVSS5.0
发布时间 :2004-02-16 00:00:00
修订时间 :2008-09-10 15:29:26
NMCOPS    

[原文]Unknown vulnerability in the rwho daemon (rwhod) before 0.17, on little endian architectures, allows remote attackers to cause a denial of service (application crash).


[CNNVD]Netkit Rwho Packet Size服务拒绝漏洞(CNNVD-200402-046)

        rwho daemon (rwhod)0.17之前的版本在little endian architectures上存在未知的漏洞。远程攻击者借助该漏洞导致服务拒绝(应用崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:mandrakesoft:mandrake_linux:10.1MandrakeSoft Mandrake Linux 10.1
cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64
cpe:/o:debian:debian_linux:3.0::woody
cpe:/o:mandrakesoft:mandrake_linux:10.0MandrakeSoft Mandrake Linux 10.0
cpe:/o:mandrakesoft:mandrake_linux:10.1::x86_64
cpe:/o:sun:solaris:9.0
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64
cpe:/o:sun:solaris
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1MandrakeSoft Mandrake Linux Corporate Server 2.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1180
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1180
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200402-046
(官方数据源) CNNVD

- 其它链接及资源

http://www.debian.org/security/2005/dsa-678
(VENDOR_ADVISORY)  DEBIAN  DSA-678
http://www.mandriva.com/security/advisories?name=MDKSA-2005:039
(UNKNOWN)  MANDRAKE  MDKSA-2005:039
http://secunia.com/advisories/14309
(UNKNOWN)  SECUNIA  14309

- 漏洞信息

Netkit Rwho Packet Size服务拒绝漏洞
中危 其他
2004-02-16 00:00:00 2005-10-20 00:00:00
远程  
        rwho daemon (rwhod)0.17之前的版本在little endian architectures上存在未知的漏洞。远程攻击者借助该漏洞导致服务拒绝(应用崩溃)。

- 公告与补丁

        Debian has released advisory DSA 678-1 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        Mandrake Linux has released advisory MDKSA-2005:039 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        Netkit Linux Netkit 0.17
        

- 漏洞信息 (F36155)

dsa-678.txt (PacketStormID:F36155)
2005-02-23 00:00:00
 
advisory
linux,debian
CVE-2004-1180
[点击下载]

Debian Security Advisory 678-1 - Vlad902 discovered a vulnerability in the rwhod program that can be used to crash the listening process. The broadcasting one is unaffected.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 678-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
February 11th, 2005                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : netkit-rwho
Vulnerability  : missing input validation
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1180

"Vlad902" discovered a vulnerability in the rwhod program that can be
used to crash the listening process.  The broadcasting one is
unaffected.  This vulnerability only affects little endian
architectures (i.e. on Debian: alpha, arm, alpha, ia64, i386, mipsel
and s390).

For the stable distribution (woody) this problem has been fixed in
version 0.17-4woody2.

For the unstable distribution (sid) this problem has been fixed in
version 0.17-8.

We recommend that you upgrade your rwhod package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/netkit-rwho_0.17-4woody2.dsc
      Size/MD5 checksum:      573 232cc3d400360adf91f477ae6e4df1db
    http://security.debian.org/pool/updates/main/n/netkit-rwho/netkit-rwho_0.17-4woody2.diff.gz
      Size/MD5 checksum:    10970 67909ae8e428409b9d66e59d053df76d
    http://security.debian.org/pool/updates/main/n/netkit-rwho/netkit-rwho_0.17.orig.tar.gz
      Size/MD5 checksum:    20610 0f71620d45d472f89134ba0d74242e75

  Alpha architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_alpha.deb
      Size/MD5 checksum:    15600 9209b79116d4da8e61c042daa60d8571
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_alpha.deb
      Size/MD5 checksum:    19020 20244ee92243cbf7a73fbf63ef4669df

  ARM architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_arm.deb
      Size/MD5 checksum:    13096 eced290e15edb12ddec5c0f4bc2f873c
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_arm.deb
      Size/MD5 checksum:    17464 98c7f887ab745f562d4dcb12bf42bbbf

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_i386.deb
      Size/MD5 checksum:    12692 04e8597017f17b8357aabfd12171ebfe
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_i386.deb
      Size/MD5 checksum:    17364 d510fe20152828ede22d85c9e8b7eeb8

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_ia64.deb
      Size/MD5 checksum:    15946 3e478d1bb74472c6cd967e7890e5d624
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_ia64.deb
      Size/MD5 checksum:    20658 4f3f5a38d76c868ea028e20df6a58abf

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_hppa.deb
      Size/MD5 checksum:    13906 5890c7723b8aad599e8605e122934a93
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_hppa.deb
      Size/MD5 checksum:    18066 4c9fc358830c8ad2885779f02c246b66

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_m68k.deb
      Size/MD5 checksum:    12654 f600ddc3d01ee478115438c751c0836f
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_m68k.deb
      Size/MD5 checksum:    17100 d47344fcf36586bf35ba8552b924e7e9

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_mips.deb
      Size/MD5 checksum:    13218 05ce9334de62e64a6031d0a397b52b8e
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_mips.deb
      Size/MD5 checksum:    17120 5c7e1752201621b82154d8107e466fe0

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_mipsel.deb
      Size/MD5 checksum:    13266 58bdafa0f3727901bea58b5337078dc6
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_mipsel.deb
      Size/MD5 checksum:    17446 d2a3eb4211c8b7beaa502a489a08037c

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_powerpc.deb
      Size/MD5 checksum:    13030 e472eb81db77c5e50b5756ce58c92795
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_powerpc.deb
      Size/MD5 checksum:    17122 fc8bb02bcc162a54076405e1cbe7b0d0

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_s390.deb
      Size/MD5 checksum:    13414 9f2dea228f0c0ed3452d26e11366a47f
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_s390.deb
      Size/MD5 checksum:    17842 00320623fa238648f89a6fde1a03eefc

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwho_0.17-4woody2_sparc.deb
      Size/MD5 checksum:    16062 d8b71eb71a33f4b45132a91731ab1d6e
    http://security.debian.org/pool/updates/main/n/netkit-rwho/rwhod_0.17-4woody2_sparc.deb
      Size/MD5 checksum:    19818 9b1462f4fbf007255f380ce632bf868c


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCDMquW5ql+IAeqTIRAkPuAJ0Q/CvJRWhQ+XC7f3JyprLph7BSbQCeOaAd
mX1lhOvHgNy0IxEUzAc6Pj8=
=xm9G
-----END PGP SIGNATURE-----

    

- 漏洞信息

13778
NetKit Rwho Service (netkit-rwho) rwhod Packet Validation Remote DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Availability

- 漏洞描述

rwho contains a flaw that may allow a remote denial of service. The issue is triggered by specially crafted packets which are not validated by the rwhod daemon, and will result in loss of availability for the service.

- 时间线

2005-02-11 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue in the original version. Some vendors which package this application have provided patches applicable to their distributions.

- 相关参考

- 漏洞作者

- 漏洞信息

Netkit RWho Packet Size Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 12524
Yes No
2005-02-11 12:00:00 2009-07-12 10:06:00
Discovery is credited to Vlad902.

- 受影响的程序版本

Netkit Linux Netkit 0.17
+ Caldera OpenLinux 2.4
+ Caldera OpenLinux 2.3
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Gentoo Linux
+ Red Hat Enterprise Linux AS 4
+ Red Hat Enterprise Linux AS 3
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Desktop 4.0
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 4
+ RedHat Enterprise Linux WS 3
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ SCO eDesktop 2.4
+ SCO eServer 2.3.1
+ Sun Solaris 9_x86 Update 2
+ Sun Solaris 9_x86
+ Sun Solaris 9
+ Sun Solaris 8_x86
+ Sun Solaris 8_sparc
+ Sun Solaris 7.0_x86
+ Sun Solaris 7.0
+ Sun Solaris 10
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1

- 漏洞讨论

The Netkit rwho daemon is prone to a denial of service vulnerability. This condition occurs when the server processes packets with malformed sizes.

The vulnerability is only reported to affect the software running on little endian platforms.

It is not known if this condition is due to a boundary condition error or if it may further be leveraged to execute arbitrary code.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian has released advisory DSA 678-1 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

Mandrake Linux has released advisory MDKSA-2005:039 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.


Netkit Linux Netkit 0.17

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站