CVE-2004-1292
CVSS10.0
发布时间 :2005-01-10 00:00:00
修订时间 :2008-09-05 16:40:54
NMCOPS    

[原文]Buffer overflow in the parse_emelody function in parse_emelody.c for ringtonetools 2.22 allows remote attackers to execute arbitrary code via a crafted eMelody file.


[CNNVD]RingtoneTools parse_emelody.c 缓冲区溢出漏洞(CNNVD-200501-066)

        ringtonetools是一款用于定制手机铃声及图篇的工具。
        ringtonetools 2.22的parse_emelody.c中的parse_emelody函数存在缓冲区溢出。
        远程攻击者可以借助特制的eMelody文件执行任意代码。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1292
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1292
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-066
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/18557
(UNKNOWN)  XF  ringtonetools-parseemelody-bo(18557)
http://www.gentoo.org/security/en/glsa/glsa-200503-18.xml
(UNKNOWN)  GENTOO  GLSA-200503-18
http://tigger.uic.edu/~jlongs2/holes/ringtonetools.txt
(VENDOR_ADVISORY)  MISC  http://tigger.uic.edu/~jlongs2/holes/ringtonetools.txt

- 漏洞信息

RingtoneTools parse_emelody.c 缓冲区溢出漏洞
危急 缓冲区溢出
2005-01-10 00:00:00 2005-10-20 00:00:00
远程  
        ringtonetools是一款用于定制手机铃声及图篇的工具。
        ringtonetools 2.22的parse_emelody.c中的parse_emelody函数存在缓冲区溢出。
        远程攻击者可以借助特制的eMelody文件执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://ringtonetools.mikekohn.net/download.php
        

- 漏洞信息 (F36649)

Gentoo Linux Security Advisory 200503-18 (PacketStormID:F36649)
2005-03-22 00:00:00
Gentoo  security.gentoo.org
advisory,overflow
linux,gentoo
CVE-2004-1292
[点击下载]

Gentoo Linux Security Advisory GLSA 200503-18 - Qiao Zhang has discovered a buffer overflow vulnerability in the 'parse_emelody' function in 'parse_emelody.c'. Versions less than 2.23 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200503-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Ringtone Tools: Buffer overflow vulnerability
      Date: March 15, 2005
      Bugs: #74700
        ID: 200503-18

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

The Ringtone Tools utilities contain a buffer overflow vulnerability,
potentially leading to the execution of arbitrary code.

Background
==========

Ringtone Tools is a program for creating ringtones and logos for mobile
phones.

Affected packages
=================

    -------------------------------------------------------------------
     Package                 /  Vulnerable  /               Unaffected
    -------------------------------------------------------------------
  1  app-misc/ringtonetools       < 2.23                       >= 2.23

Description
===========

Qiao Zhang has discovered a buffer overflow vulnerability in the
'parse_emelody' function in 'parse_emelody.c'.

Impact
======

A remote attacker could entice a Ringtone Tools user to open a
specially crafted eMelody file, which would potentially lead to the
execution of arbitrary code with the rights of the user running the
application.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Ringtone Tools users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-misc/ringtonetools-2.23"

References
==========

  [ 1 ] CAN-2004-1292
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1292

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200503-18.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0
    

- 漏洞信息

12442
Ring Tone Tools parse_emelody() eMelody File Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-12-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Michael Kohn Ringtone Tools EMelody File Remote Buffer Overflow Vulnerability
Boundary Condition Error 12010
Yes No
2004-12-15 12:00:00 2009-07-12 09:26:00
Discovery is credited to Qiao Zhang.

- 受影响的程序版本

Michael Kohn Ringtone Tools 2.22
Gentoo Linux

- 漏洞讨论

Ringtone Tools is reported prone to a remote buffer overflow vulnerability. This issue arises because the application fails to carry out proper boundary checks before copying user-supplied data in to sensitive process buffers. It is reported that this issue can allow an attacker to gain unauthorized access to a computer in the context of the application.

An attacker can exploit this issue by crafting a malicious eMelody file that contains excessive string data, replacement memory addresses, and executable instructions to trigger this issue.

If a user obtains this file and processes it through the application, the attacker-supplied instructions may be executed on the vulnerable computer. It is reported that successful exploitation may result in a compromise in the context of the application.

Ringtone Tools version 2.22 is reported prone to this vulnerability. It is likely that other versions are affected as well.

- 漏洞利用

A proof of concept example is available:

- 解决方案

Gentoo has released an advisory (GLSA 200503-18) and an updated eBuild to address this vulnerability. Gentoo users may install these updates by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=app-misc/ringtonetools-2.23"

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站