CVE-2005-4534
CVSS7.5
发布时间 :2005-12-27 21:03:00
修订时间 :2008-09-05 16:57:09
NMCOPS    

[原文]The shadow database feature (syncshadowdb) in Bugzilla 2.9 through 2.16.10 allows local users to overwrite arbitrary files via a symlink attack on temporary files.


[CNNVD]Bugzilla Syncshadowdb不安全临时文件创建漏洞(CNNVD-200512-572)

        Bugzilla 2.9至2.16.10版本中的shadow数据库 (syncshadowdb) 特性使得本地用户可以通过对任意文件发起symlink攻击来重写任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:bugzilla:2.16.1Mozilla Bugzilla 2.16.1
cpe:/a:mozilla:bugzilla:2.16.8Mozilla Bugzilla 2.16.8
cpe:/a:mozilla:bugzilla:2.10Mozilla Bugzilla 2.10
cpe:/a:mozilla:bugzilla:2.16.10Mozilla Bugzilla 2.16.10
cpe:/a:mozilla:bugzilla:2.12Mozilla Bugzilla 2.12
cpe:/a:mozilla:bugzilla:2.14.4Mozilla Bugzilla 2.14.4
cpe:/a:mozilla:bugzilla:2.16.2Mozilla Bugzilla 2.16.2
cpe:/a:mozilla:bugzilla:2.14.3Mozilla Bugzilla 2.14.3
cpe:/a:mozilla:bugzilla:2.16.9Mozilla Bugzilla 2.16.9
cpe:/a:mozilla:bugzilla:2.14.1Mozilla Bugzilla 2.14.1
cpe:/a:mozilla:bugzilla:2.14.2Mozilla Bugzilla 2.14.2
cpe:/a:mozilla:bugzilla:2.16.5Mozilla Bugzilla 2.16.5
cpe:/a:mozilla:bugzilla:2.14.5Mozilla Bugzilla 2.14.5
cpe:/a:mozilla:bugzilla:2.16.3Mozilla Bugzilla 2.16.3
cpe:/a:mozilla:bugzilla:2.16.6Mozilla Bugzilla 2.16.6
cpe:/a:mozilla:bugzilla:2.14Mozilla Bugzilla 2.14
cpe:/a:mozilla:bugzilla:2.16.7Mozilla Bugzilla 2.16.7
cpe:/a:mozilla:bugzilla:2.16Mozilla Bugzilla 2.16
cpe:/a:mozilla:bugzilla:2.16.4Mozilla Bugzilla 2.16.4
cpe:/a:mozilla:bugzilla:2.9Mozilla Bugzilla 2.9

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4534
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4534
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-572
(官方数据源) CNNVD

- 其它链接及资源

https://bugzilla.mozilla.org/show_bug.cgi?id=305353
(PATCH)  CONFIRM  https://bugzilla.mozilla.org/show_bug.cgi?id=305353
http://www.securityfocus.com/bid/16061
(PATCH)  BID  16061
http://securitytracker.com/id?1015411
(PATCH)  SECTRACK  1015411
http://secunia.com/advisories/18218
(VENDOR_ADVISORY)  SECUNIA  18218
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329387
(PATCH)  MISC  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329387
http://www.securityfocus.com/archive/1/archive/1/420353/100/0/threaded
(UNKNOWN)  BUGTRAQ  20051228 [BUGZILLA] Security advisory for Bugzilla < 2.16.11
http://xforce.iss.net/xforce/xfdb/23863
(UNKNOWN)  XF  bugzilla-syncshadowdb-symlink(23863)
http://www.debian.org/security/2006/dsa-1208
(UNKNOWN)  DEBIAN  DSA-1208
http://securityreason.com/securityalert/302
(UNKNOWN)  SREASON  302
http://secunia.com/advisories/22826
(UNKNOWN)  SECUNIA  22826

- 漏洞信息

Bugzilla Syncshadowdb不安全临时文件创建漏洞
高危 设计错误
2005-12-27 00:00:00 2006-06-06 00:00:00
本地  
        Bugzilla 2.9至2.16.10版本中的shadow数据库 (syncshadowdb) 特性使得本地用户可以通过对任意文件发起symlink攻击来重写任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        https://bugzilla.mozilla.org/attachment.cgi?id=203870
        http://security.debian.org/pool/updates/main/b/bugzilla/bugzilla-doc_2.16.7-7sarge2_all.deb
        http://security.debian.org/pool/updates/main/b/bugzilla/bugzilla_2.16.7-7sarge2_all.deb

- 漏洞信息 (F51998)

Debian Linux Security Advisory 1208-1 (PacketStormID:F51998)
2006-11-14 00:00:00
Debian  debian.org
advisory,remote,arbitrary,vulnerability
linux,debian
CVE-2005-4534,CVE-2006-5453
[点击下载]

Debian Security Advisory 1208-1 - Several remote vulnerabilities have been discovered in the Bugzilla bug tracking system, which may lead to the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1208-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
November 11th, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : bugzilla
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2005-4534 CVE-2006-5453
Debian Bug     : 395094 329387

Several remote vulnerabilities have been discovered in the Bugzilla
bug tracking system, which may lead to the execution of arbitrary code.
The Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2005-4534

    Javier Fern    

- 漏洞信息

22061
Bugzilla syncshadowdb Symlink Arbitrary File Overwrite
Local Access Required Race Condition
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-12-26 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.16.11, 2.18 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Bugzilla Syncshadowdb Insecure Temporary File Creation Vulnerability
Design Error 16061
No Yes
2005-12-26 12:00:00 2007-11-15 12:38:00
Javier Fernandez-Sanguino Pena is credited with the discovery of this vulnerability.

- 受影响的程序版本

Mozilla Bugzilla 2.16.9
Mozilla Bugzilla 2.16.8
Mozilla Bugzilla 2.16.7
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
Mozilla Bugzilla 2.16.6
Mozilla Bugzilla 2.16.5
Mozilla Bugzilla 2.16.4
Mozilla Bugzilla 2.16.3
Mozilla Bugzilla 2.16.2
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
Mozilla Bugzilla 2.16.1
Mozilla Bugzilla 2.16 .10
Mozilla Bugzilla 2.16
- Mandriva Linux Mandrake 9.0
- Mandriva Linux Mandrake 9.0
Mozilla Bugzilla 2.14.5
Mozilla Bugzilla 2.14.4
Mozilla Bugzilla 2.14.3
Mozilla Bugzilla 2.14.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
Mozilla Bugzilla 2.14.1
Mozilla Bugzilla 2.14
- RedHat Linux 7.1
- RedHat Linux 7.1
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
Mozilla Bugzilla 2.12
Mozilla Bugzilla 2.10
Mozilla Bugzilla 2.9

- 漏洞讨论

Bugzilla creates temporary files in an insecure manner.

Exploitation would most likely result in loss of data or a denial of service if critical files are overwritten in the attack. Other attacks may be possible as well.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released a patch to address this issue. This patch will be included in the upcoming 2.16.11 release of Bugzilla as well.

Debian has released security advisory DSA 1208-1 to address this issue; please see the references for details.


Mozilla Bugzilla 2.16 .10

Mozilla Bugzilla 2.16.7

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站