发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:48:14

[原文]The filtering of URLs in JunkBuster before 2.0.2-r3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via heap corruption.


        JunkBuster 2.0.2-r3之前版本中的URL过滤,允许远程攻击者通过堆损坏来引起拒绝服务(应用程序崩溃)攻击,以及可能执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  XF  junkbuster-heap-corruption(20094)
(PATCH)  BID  13146

- 漏洞信息

高危 边界条件错误
2005-05-02 00:00:00 2005-10-20 00:00:00
        JunkBuster 2.0.2-r3之前版本中的URL过滤,允许远程攻击者通过堆损坏来引起拒绝服务(应用程序崩溃)攻击,以及可能执行任意代码。

- 公告与补丁


- 漏洞信息 (F37810)

dsa-713.txt (PacketStormID:F37810)
2005-06-01 00:00:00

Debian Security Advisory DSA 713-1 - Several bugs have been found in junkbuster, a HTTP proxy and filter.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 713-1                                        Martin Schulze
April 21st, 2005              
- --------------------------------------------------------------------------

Package        : junkbuster
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-1108 CAN-2005-1109

Several bugs have been found in junkbuster, a HTTP proxy and filter.
The Common Vulnerability and Exposures project identifies the
following vulnerabilities:


    James Ranson discovered that an attacker can modify the referrer
    setting with a carefully crafted URL by accidently overwriting a
    global variable.


    Tavis Ormandy from the Gentoo Security Team discovered several
    heap corruptions due to inconsistent use of an internal function
    that can crash the daemon or possibly lead to the execution of
    arbitrary code.

For the stable distribution (woody) these problems have been fixed in
version 2.0.2-0.2woody1.

The unstable distribution (sid) doesn't contain the junkbuster package

We recommend that you upgrade your junkbuster package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      580 1cdd2e8d2e09436cb8e2bc33b5154507
      Size/MD5 checksum:    35888 40990dc45ceffb0753f3f67a1a777a9f
      Size/MD5 checksum:   190501 87d96ac9fca6e9749f1b330fbc2e0e5c

  Alpha architecture:
      Size/MD5 checksum:   108972 9d4516bf66d0e8825cfa7f6835fa21b1

  ARM architecture:
      Size/MD5 checksum:   104828 54d4c289fd14ff250a9146f7d816354b

  Intel IA-32 architecture:
      Size/MD5 checksum:   103932 6629b6cc4364ff52575e30164c61f79c

  Intel IA-64 architecture:
      Size/MD5 checksum:   118322 087d9fac21f9cfbf663816a3b45a0588

  HP Precision architecture:
      Size/MD5 checksum:   108420 b794d097c59728246128ac3da1c4f4bd

  Motorola 680x0 architecture:
      Size/MD5 checksum:   101920 0e03c20861d536936500311a79678119

  Big endian MIPS architecture:
      Size/MD5 checksum:   106996 e66b3dcce5d4797e9111b955b8ddbbb4

  Little endian MIPS architecture:
      Size/MD5 checksum:   107078 d0a5c23e80800dc33b4fefd80a866416

  PowerPC architecture:
      Size/MD5 checksum:   104740 98fbadd57996160f04581e88c8181cb1

  IBM S/390 architecture:
      Size/MD5 checksum:   103856 c879b8597bdb25363fb934a2b31101cc

  Sun Sparc architecture:
      Size/MD5 checksum:   108180 39cf7dfaa41dc45c67e345e331116d85

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>

Version: GnuPG v1.4.0 (GNU/Linux)



- 漏洞信息

Internet Junkbuster URL Filtering Heap Corruption
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

JunkBuster contains a flaw that may allow a malicious user to modify the configuration setting. The issue is due to a heap corruption error in the filtering of URLs. When JunkBuster is configured to run in single-threaded mode, an attacker can modify the referrer setting with a specially crafted URL, resulting in a loss of confidentiality and integrity.

- 时间线

2005-04-13 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.0.2-r3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

JunkBuster Heap Corruption Vulnerability
Boundary Condition Error 13146
Yes No
2005-04-13 12:00:00 2009-07-12 12:56:00
Discovery credited to Tavis Ormandy.

- 受影响的程序版本

Junkbuster Internet Junkbuster 2.0.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Gentoo Linux
+ RedHat Linux 7.2
+ RedHat Linux 7.1
+ RedHat Linux 7.0
Junkbuster Internet Junkbuster 2.0.1
+ Red Hat Linux 6.2

- 漏洞讨论

JunkBuster is prone to a heap corruption vulnerability during the filtering of URI's. This could potentially be exploited to execute arbitrary code.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

Gentoo has released advisory GLSA 200504-11 and fixes for this issue. To obtain fixes, users should execute the following commands:

emerge --sync
emerge --ask --oneshot --verbose ">=www-proxy/junkbuster-2.0.2-r3"

Debian has released advisory DSA 713-1 and fixes to address this issue. Please see the referenced advisory for links to fixed packages.

Junkbuster Internet Junkbuster 2.0.2

- 相关参考