CVE-2005-0071
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:45:13
NMCOPS    

[原文]vdr before 1.2.6 does not securely create files, which allows attackers to overwrite arbitrary files.


[CNNVD]VDR 未明远程文件访问漏洞(CNNVD-200505-336)

        vdr 1.2.6之前的版本并不能安全地创建文件,从而允许攻击者重写任意的文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:vdr:vdr:1.0.0
cpe:/a:vdr:vdr:1.0.4
cpe:/a:vdr:vdr:1.2.5
cpe:/a:vdr:vdr:1.2.1
cpe:/a:vdr:vdr:1.2.2
cpe:/a:vdr:vdr:1.2.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0071
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0071
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-336
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/19066
(UNKNOWN)  XF  vdr-dvdapi-file-overwrite(19066)
http://www.gentoo.org/security/en/glsa/glsa-200501-42.xml
(UNKNOWN)  GENTOO  GLSA-200501-42
http://www.debian.org/security/2005/dsa-656
(UNKNOWN)  DEBIAN  DSA-656
http://www.securityfocus.com/bid/12356
(UNKNOWN)  BID  12356
http://secunia.com/advisories/14066
(UNKNOWN)  SECUNIA  14066
http://secunia.com/advisories/13995
(UNKNOWN)  SECUNIA  13995
http://secunia.com/advisories/13930
(UNKNOWN)  SECUNIA  13930

- 漏洞信息

VDR 未明远程文件访问漏洞
中危 访问验证错误
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        vdr 1.2.6之前的版本并不能安全地创建文件,从而允许攻击者重写任意的文件。

- 公告与补丁

        暂无数据

- 漏洞信息 (F35964)

Gentoo Linux Security Advisory 200501-42 (PacketStormID:F35964)
2005-02-01 00:00:00
Gentoo  security.gentoo.org
advisory,arbitrary
linux,gentoo
CVE-2005-0071
[点击下载]

Gentoo Linux Security Advisory GLSA 200501-42 - VDR insecurely accesses files with elevated privileges, which may result in the overwriting of arbitrary files.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200501-42
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: VDR: Arbitrary file overwriting issue
      Date: January 30, 2005
      Bugs: #78230
        ID: 200501-42

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

VDR insecurely accesses files with elevated privileges, which may
result in the overwriting of arbitrary files.

Background
==========

Video Disk Recorder (VDR) is a Linux-based digital video recorder. The
VDR program handles the On Screen Menu system that offers complete
control over channel settings, timers and recordings.

Affected packages
=================

    -------------------------------------------------------------------
     Package          /  Vulnerable  /                      Unaffected
    -------------------------------------------------------------------
  1  media-video/vdr     < 1.2.6-r1                        >= 1.2.6-r1

Description
===========

Javier Fernandez-Sanguino Pena from the Debian Security Audit Team
discovered that VDR accesses user-controlled files insecurely.

Impact
======

A local attacker could create malicious links and invoke a VDR
recording that would overwrite arbitrary files on the system.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All VDR users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-video/vdr-1.2.6-r1"

References
==========

  [ 1 ] CAN-2005-0071
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0071

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200501-42.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

    

- 漏洞信息 (F35896)

dsa-656.txt (PacketStormID:F35896)
2005-01-26 00:00:00
 
advisory,arbitrary
linux,debian
CVE-2005-0071
[点击下载]

Debian Security Advisory 656-1 - The Debian Security Audit Team has discovered that the vdr daemon which is used for video disk recorders for DVB cards can overwrite arbitrary files.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 656-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 25th, 2005                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : vdr
Vulnerability  : insecure file access
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0071

Javier Fern    

- 漏洞信息

13174
Multiple Linux vdr Arbitrary File Overwrite

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-01-25 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

VDR Daemon Unspecified Remote File Access Vulnerability
Access Validation Error 12356
Yes No
2005-01-25 12:00:00 2009-07-12 10:06:00
Javier Fernández-Sanguino Peña is credited with the discovery of this issue.

- 受影响的程序版本

vdr daemon 1.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0

- 漏洞讨论

An unspecified remote file access vulnerability affects the vdr daemon. The underlying issue that causes this vulnerability is likely a failure to abide by file access restrictions, although this is unconfirmed.This BID will be updated as more details are released.

An attacker may leverage this issue to overwrite arbitrary files on an affected computer. This can lead to a superuser compromise of the affected computer, corruption of data, as well as other attacks.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian has released advisory DSA 656-1 along with fixes dealing with this issue. Please see the referenced advisory for more information.

Gentoo has released advisory GLSA 200501-42 to address this issue. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=media-video/vdr-1.2.6-r1"

Please see the referenced Gentoo advisory for more information.


vdr daemon 1.0

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站