CVE-2005-0087
CVSS4.6
发布时间 :2005-04-27 00:00:00
修订时间 :2010-08-21 00:25:28
NMCOS    

[原文]The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier for attackers to execute arbitrary code if there are other vulnerabilities in the library.


[CNNVD]Red Hat Linux Libasound.SO栈内存保护禁用漏洞(CNNVD-200504-115)

        Red Hat Linux是由Red hat公司维护和发布的Linux操作系统。
        Red Hat Linux 4中的alsa-lib包禁用了libasound.so库的栈保护功能, 如果库中有漏洞,攻击者更加容易执行任意代码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:enterprise_linux:4.0::advanced_server
cpe:/o:redhat:enterprise_linux:4.0::enterprise_server
cpe:/o:alsa:alsa-lib:1.0.6
cpe:/o:redhat:enterprise_linux:4.0::desktop
cpe:/o:redhat:enterprise_linux:4.0::workstation

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10355The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier for attackers to execu...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0087
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0087
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200504-115
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2005-033.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:033

- 漏洞信息

Red Hat Linux Libasound.SO栈内存保护禁用漏洞
中危 资料不足
2005-04-27 00:00:00 2005-10-20 00:00:00
本地  
        Red Hat Linux是由Red hat公司维护和发布的Linux操作系统。
        Red Hat Linux 4中的alsa-lib包禁用了libasound.so库的栈保护功能, 如果库中有漏洞,攻击者更加容易执行任意代码。

- 公告与补丁

        暂无数据

- 漏洞信息

13854
ALSA libasound.so Stack Protection Bypass
Local Access Required Attack Type Unknown
Loss of Integrity
Exploit Unknown

- 漏洞描述

Alsa contains a flaw that may allow a malicious user to bypass stack execution protection for the 'libasound.so' library. The issue is triggered when any application is linked to libasound. It is possible that the flaw may allow a local attacker to disable stack execution protection for the linked applications resulting in a loss of integrity.

- 时间线

2005-02-15 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue. Some Unix vendors have released patches for their own distributions.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Advanced Linux Sound Architecture Libasound.SO Stack-Memory Protection Bypass Weakness
Unknown 12575
No Yes
2005-02-16 12:00:00 2009-07-12 10:06:00
This weakness was announced in a vendor advisory.

- 受影响的程序版本

RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux Desktop version 4
Red Hat Enterprise Linux AS 4
ALSA alsa-lib 1.0.6
+ Red Hat Fedora Core3

- 漏洞讨论

A security weakness is reported to affect the Advanced Linux Sound Architecture (ALSA) 'libasound.so' module; specifically the issue is reported to be present in the ALSA mixer code. It is reported that the weakness can be leveraged to disable stack-based memory code execution protection on binaries that are linked to the library.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Red Hat has released advisory RHSA-2005:033-01 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站