CVE-2005-0531
CVSS2.1
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:12:25
NMCO    

[原文]The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments.


[CNNVD]Linux内核多个本地缓冲区溢出和内存泄露漏洞(CNNVD-200505-724)

        Linux kernel 2.6.10及2.6.11中早于2.6.11-rc4的版本的addr.c中的atm_get_addr函数使得本地用户可以通过一个负数参数来触发缓冲区溢出。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.11:rc1Linux Kernel 2.6.11 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10095The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0531
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0531
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-724
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
(PATCH)  CONECTIVA  CLA-2005:930
http://linux.bkbits.net:8080/linux-2.6/gnupatch@4208e1fcfccuD-eH2OGM5mBhihmQ3A
(PATCH)  CONFIRM  http://linux.bkbits.net:8080/linux-2.6/gnupatch@4208e1fcfccuD-eH2OGM5mBhihmQ3A
http://marc.info/?l=bugtraq&m=111091402626556&w=2
(UNKNOWN)  BUGTRAQ  20050315 [USN-95-1] Linux kernel vulnerabilities
http://marc.info/?l=full-disclosure&m=110846727602817&w=2
(UNKNOWN)  FULLDISC  20050215 linux kernel 2.6 fun. windoze is a joke
http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
(VENDOR_ADVISORY)  MISC  http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
http://www.redhat.com/support/errata/RHSA-2005-366.html
(UNKNOWN)  REDHAT  RHSA-2005:366

- 漏洞信息

Linux内核多个本地缓冲区溢出和内存泄露漏洞
低危 缓冲区溢出
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        Linux kernel 2.6.10及2.6.11中早于2.6.11-rc4的版本的addr.c中的atm_get_addr函数使得本地用户可以通过一个负数参数来触发缓冲区溢出。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Linux kernel 2.6.10 rc2
        Linux patch-2.6.11-rc4.bz2
        http://kernel.org/pub/linux/kernel/v2.6/testing/patch-2.6.11-rc4.bz2
        Linux kernel 2.6.10
        Linux patch-2.6.11-rc4.bz2
        http://kernel.org/pub/linux/kernel/v2.6/testing/patch-2.6.11-rc4.bz2
        Linux kernel 2.6.11 -rc3
        Linux patch-2.6.11-rc4.bz2
        http://kernel.org/pub/linux/kernel/v2.6/testing/patch-2.6.11-rc4.bz2
        Linux kernel 2.6.11 -rc2
        Linux patch-2.6.11-rc4.bz2
        http://kernel.org/pub/linux/kernel/v2.6/testing/patch-2.6.11-rc4.bz2
        Linux kernel 2.6.4
        SuSE kernel-bigsmp-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6 .5-7.151.i586.rpm
        SuSE kernel-default-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2. 6.5-7.151.i586.rpm
        SuSE kernel-default-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-defaul t-2.6.5-7.151.x86_64.rpm
        SuSE kernel-docs-2.6.5-7.151.noarch.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6 .5-7.151.noarch.rpm
        SuSE kernel-smp-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5- 7.151.i586.rpm
        SuSE kernel-smp-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2. 6.5-7.151.x86_64.rpm
        SuSE kernel-source-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6 .5-7.151.i586.rpm
        SuSE kernel-source-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source -2.6.5-7.151.x86_64.rpm
        SuSE kernel-syms-2.6.5-7.151.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5 -7.151.i586.rpm
        SuSE kernel-syms-2.6.5-7.151.x86_64.rpm
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2 .6.5-7.151.x86_64.rpm
        SuSE ltmodem-2.6.2-38.14.i586.rpm
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38. 14.i586.rpm
        Linux kernel 2.6.5
        Conectiva kernel26-2.6.10-72032U10_12cl.athlon.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.10-72032U10_1 2cl.athlon.rpm
        Conectiva kernel26-2.6.10-72032U10_12cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.10-72032U10_1 2cl.i386.rpm
        Conectiva kernel26-2.6.10-72032U10_12cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.10-72032U10_1 2cl.i586.rpm
        Conectiva kernel26-2.6.10-72032U10_12cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.10-72032U10_1 2cl.i686.rpm
        Conectiva kernel26-2.6.10-72032U10_12cl.pentium4.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.10-72032U10_1 2cl.pentium4.rpm
        Conectiva kernel26-BOOT-2.6.10-72032U10_12cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-2.6.10-72032 U10_12cl.i386.rpm
        Conectiva kernel26-BOOT-module-drbd-2.6.10.72032U10_12cl.0.7.5-71801U10_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-drbd- 2.6.10.72032U10_12cl.0.7.5-71801U10_3cl.i386.rpm
        Conectiva kernel26-BOOT-module-madwifi-2.6.10.72032U10_12cl.20041216-63166U10_4cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-madwi fi-2.6.10.72032U10_12cl.20041216-63166U10_4cl.i386.rpm
        Conectiva kernel26-BOOT-module-ndiswrapper-2.6.10.72032U10_12cl.0.12-72907U10_2cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-ndisw rapper-2.6.10.72032U10_12cl.0.12-72907U10_2cl.i386.rpm
        Conectiva kernel26-BOOT-module-nvidia-2.6.10.72032U10_12cl.1.0.6629-71023U10_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-nvidi a-2.6.10.72032U10_12cl.1.0.6629-71023U10_3cl.i386.rpm
        Conectiva kernel26-BOOT-module-slmodem-2.6.10.72032U10_12cl.2.9.7-63168U10_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-slmod em-2.6.10.72032U10_12cl.2.9.7-63168U10_3cl.i386.rpm
        Conectiva kernel26-doc-2.6.10-72032U10_12cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-doc-2.6.10-72032U 10_12cl.i386.rpm
        Conectiva kernel26-enterprise-2.6.10-

- 漏洞信息

13820
Linux Kernel addr.c atm_get_addr Function Local Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-02-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站