CVE-2005-4591
CVSS7.5
发布时间 :2005-12-31 00:00:00
修订时间 :2011-03-07 21:28:32
NMCOPS    

[原文]Heap-based buffer overflow in bogofilter 0.96.2, 0.95.2, 0.94.14, 0.94.12, and other versions from 0.93.5 to 0.96.2, when using Unicode databases, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "invalid input sequences" that lead to heap corruption when bogofilter or bogolexer converts character sets.


[CNNVD]Bogofilter多个远程缓冲区溢出漏洞(CNNVD-200512-973)

        当使用Unicode数据库时,bogofilter 0.96.2、0.95.2、0.94.14、0.94.12及自0.93.5至0.96.2的其他版本存在栈缓冲区溢出,远程攻击者可通过"无效输入序列",导致在bogofilter或bogolexer转换字符集时出现堆破坏,从而发起拒绝服务攻击(崩溃)并可能执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:bogofilter:email_filter:0.95.2
cpe:/o:bogofilter:email_filter:0.94.14
cpe:/o:bogofilter:email_filter:0.93.5
cpe:/o:bogofilter:email_filter:0.94.12
cpe:/o:bogofilter:email_filter:0.96.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4591
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4591
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-973
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/16171
(PATCH)  BID  16171
http://secunia.com/advisories/18352
(VENDOR_ADVISORY)  SECUNIA  18352
http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01
(VENDOR_ADVISORY)  CONFIRM  http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01
http://www.vupen.com/english/advisories/2006/0100
(UNKNOWN)  VUPEN  ADV-2006-0100
http://xforce.iss.net/xforce/xfdb/24118
(UNKNOWN)  XF  bogofilter-unicode-bo(24118)
http://www.ubuntulinux.org/support/documentation/usn/usn-240-1
(UNKNOWN)  UBUNTU  USN-240-1
http://secunia.com/advisories/18717
(UNKNOWN)  SECUNIA  18717
http://secunia.com/advisories/18427
(UNKNOWN)  SECUNIA  18427
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
(UNKNOWN)  SUSE  SUSE-SR:2006:003

- 漏洞信息

Bogofilter多个远程缓冲区溢出漏洞
高危 缓冲区溢出
2005-12-31 00:00:00 2006-01-11 00:00:00
远程  
        当使用Unicode数据库时,bogofilter 0.96.2、0.95.2、0.94.14、0.94.12及自0.93.5至0.96.2的其他版本存在栈缓冲区溢出,远程攻击者可通过"无效输入序列",导致在bogofilter或bogolexer转换字符集时出现堆破坏,从而发起拒绝服务攻击(崩溃)并可能执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://prdownloads.sourceforge.net/bogofilter/bogofilter-1.0.1.tar.gz
        http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1_powerpc.deb

- 漏洞信息 (F43055)

Ubuntu Security Notice 240-1 (PacketStormID:F43055)
2006-01-15 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,overflow,arbitrary
linux,ubuntu
CVE-2005-4591
[点击下载]

Ubuntu Security Notice USN-240-1 - A buffer overflow was found in bogofilter's character set conversion handling. Certain invalid UTF-8 character sequences caused an invalid memory access. By sending a specially crafted email, a remote attacker could exploit this to crash bogofilter or possibly even execute arbitrary code with bogofilter's privileges.

===========================================================
Ubuntu Security Notice USN-240-1	   January 11, 2006
bogofilter vulnerability
CVE-2005-4591
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

bogofilter

The problem can be corrected by upgrading the affected package to
version 0.95.2-1ubuntu1.1.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

A buffer overflow was found in bogofilter's character set conversion
handling. Certain invalid UTF-8 character sequences caused an invalid
memory access. By sending a specially crafted email, a remote attacker
could exploit this to crash bogofilter or possibly even execute
arbitrary code with bogofilter's privileges.


  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1.diff.gz
      Size/MD5:    10848 a3a01223665479ed500aee9b64d9669a
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1.dsc
      Size/MD5:      638 bfedbfb65a22f9a482bfa1356a7bd761
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2.orig.tar.gz
      Size/MD5:   866258 bdca7acd8cccff1976ab2ceab075830a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-bdb_0.95.2-1ubuntu1.1_amd64.deb
      Size/MD5:   291350 8173d4c3d9c06420655d6b50c43c5b44
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-common_0.95.2-1ubuntu1.1_amd64.deb
      Size/MD5:   136588 f9ce89c4857c0d764100a72e22620a28
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1_amd64.deb
      Size/MD5:      942 c4583a7d5ed114d1b23bdda9dff0b7db

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-bdb_0.95.2-1ubuntu1.1_i386.deb
      Size/MD5:   237316 62e0348f1907d35d2a990a2c69543fb6
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-common_0.95.2-1ubuntu1.1_i386.deb
      Size/MD5:   136590 acbfe94471e877359dc0e910d9be52eb
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1_i386.deb
      Size/MD5:      944 58e0b7482f9bc1a885940bfbf5d4c2ff

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-bdb_0.95.2-1ubuntu1.1_powerpc.deb
      Size/MD5:   272064 05edb162837021bbcde1d6a3c7b5f1b4
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter-common_0.95.2-1ubuntu1.1_powerpc.deb
      Size/MD5:   136574 404fc07951bb7e614a55f15f6be9460c
    http://security.ubuntu.com/ubuntu/pool/main/b/bogofilter/bogofilter_0.95.2-1ubuntu1.1_powerpc.deb
      Size/MD5:      946 a4fefa7122015cad56364bb27e29baeb
    

- 漏洞信息

22278
bogofilter bogofilter/bogolexer Character Set Conversion Overflow DoS
Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

- 时间线

2006-01-02 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.0.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Bogofilter Multiple Remote Buffer Overflow Vulnerabilities
Boundary Condition Error 16171
Yes No
2006-01-09 12:00:00 2006-12-20 11:12:00
David Relson and Clint Adams are credited with the discovery of these vulnerabilities.

- 受影响的程序版本

Yamamoto Hirotaka TRR19 0.96.2
Yamamoto Hirotaka TRR19 0.95.2
Yamamoto Hirotaka TRR19 0.94.14
Yamamoto Hirotaka TRR19 0.94.12
Yamamoto Hirotaka TRR19 0.93.5
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
Conectiva Linux 10.0
Yamamoto Hirotaka TRR19 1.0.1
Yamamoto Hirotaka TRR19 1.0 .0
Yamamoto Hirotaka TRR19 0.96.6
Yamamoto Hirotaka TRR19 0.96.3

- 不受影响的程序版本

Yamamoto Hirotaka TRR19 1.0.1
Yamamoto Hirotaka TRR19 1.0 .0
Yamamoto Hirotaka TRR19 0.96.6
Yamamoto Hirotaka TRR19 0.96.3

- 漏洞讨论

Multiple remote buffer-overflow vulnerabilities affect Bogofilter. These issues are due to the application's failure to properly handle invalid input sequences and to validate the length of user-supplied strings before copying them into static process buffers.

An attacker may exploit these issue to cause a denial-of-service condition or possibly to execute arbitrary code with the privileges of the vulnerable application. This may facilitate unauthorized access or privilege escalation.

Note that successful exploitation requires that Bogofilter be used with a Unicode database.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has released version 1.0.1 to address this issue.

Please see the referenced advisories for more information.


Yamamoto Hirotaka TRR19 0.93.5

Yamamoto Hirotaka TRR19 0.94.12

Yamamoto Hirotaka TRR19 0.94.14

Yamamoto Hirotaka TRR19 0.95.2

Yamamoto Hirotaka TRR19 0.96.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站