CVE-2006-0761
CVSS5.1
发布时间 :2006-02-17 21:02:00
修订时间 :2011-03-07 21:30:46
NMCO    

[原文]Buffer overflow in BlackBerry Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server 2.2 and 4.0 before SP3 Hotfix 4 for IBM Lotus Domino, 3.6 before SP7 and 5.0 before SP3 Hotfix 3 for Microsoft Exchangem, and 4.0 for Novell GroupWise before SP3 Hotfix 1 might allow user-assisted remote attackers to execute arbitrary code on the server via a crafted Microsoft Word document that is opened on a wireless device.


[CNNVD]BlackBerry Enterprise Server畸形Word附件缓冲区溢出漏洞(CNNVD-200602-260)

        Research in Motion (RIM) BlackBerry Enterprise Server 2.2版和4.0 SP3 Hotfix 4之前的4.0版(适用于IBM Lotus Domino)、3.6 SP7之前的3.6版以及5.0 SP3 Hotfix 3之前的5.0版(适用于Microsoft Exchangem)和4.0 SP3 Hotfix 1之前的4.0版(适用于Novell GroupWise)的BlackBerry附件服务中存在缓冲区溢出。用户协助式远程攻击者可能借助在无线设备上打开的特制Microsoft Word文档在服务器上执行任意代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:rim:blackberry_enterprise_server:4.0_sp2::novell_groupwise
cpe:/a:rim:blackberry_enterprise_server:4.0_sp1::novell_groupwise
cpe:/a:rim:blackberry_enterprise_server:4.0::novell_groupwise
cpe:/a:rim:blackberry_enterprise_server:3.6.1::exchange
cpe:/a:rim:blackberry_enterprise_server:4.0_sp3::novell_groupwise
cpe:/a:rim:blackberry_enterprise_server:4.0_sp2::domino
cpe:/a:rim:blackberry_enterprise_server:3.6_sp4_hotfix2::exchange
cpe:/a:rim:blackberry_enterprise_server:4.0_sp1::domino
cpe:/a:rim:blackberry_enterprise_server:2.2_sp2
cpe:/a:rim:blackberry_enterprise_server:2.2_sp3a
cpe:/a:rim:blackberry_enterprise_server:2.2
cpe:/a:rim:blackberry_enterprise_server:3.6::exchange
cpe:/a:rim:blackberry_enterprise_server:4.0::domino
cpe:/a:rim:blackberry_enterprise_server:2.2_sp4_hotfix2
cpe:/a:rim:blackberry_enterprise_server:2.2_sp4
cpe:/a:rim:blackberry_enterprise_server:3.6_sp1a::exchange
cpe:/a:rim:blackberry_enterprise_server:2.2_sp2a
cpe:/a:rim:blackberry_enterprise_server:4.0_sp3::domino

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0761
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0761
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-260
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/24629
(UNKNOWN)  XF  blackberry-attachment-word-bo(24629)
http://www.vupen.com/english/advisories/2006/0530
(UNKNOWN)  VUPEN  ADV-2006-0530
http://www.securityfocus.com/bid/16590
(UNKNOWN)  BID  16590
http://www.securityfocus.com/archive/1/archive/1/424728/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060210 Corrupt Word file may cause buffer overflow in the Blackberry Attachment Service
http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/8149/8052/Support_-_Corrupt_Word_file_may_cause_buffer_overflow_in_the_BlackBerry_Attachment_Service.html?nodeid=1181753&vernum=2
(UNKNOWN)  CONFIRM  http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/8149/8052/Support_-_Corrupt_Word_file_may_cause_buffer_overflow_in_the_BlackBerry_Attachment_Service.html?nodeid=1181753&vernum=2

- 漏洞信息

BlackBerry Enterprise Server畸形Word附件缓冲区溢出漏洞
中危 缓冲区溢出
2006-02-17 00:00:00 2007-06-04 00:00:00
远程  
        Research in Motion (RIM) BlackBerry Enterprise Server 2.2版和4.0 SP3 Hotfix 4之前的4.0版(适用于IBM Lotus Domino)、3.6 SP7之前的3.6版以及5.0 SP3 Hotfix 3之前的5.0版(适用于Microsoft Exchangem)和4.0 SP3 Hotfix 1之前的4.0版(适用于Novell GroupWise)的BlackBerry附件服务中存在缓冲区溢出。用户协助式远程攻击者可能借助在无线设备上打开的特制Microsoft Word文档在服务器上执行任意代码。

- 公告与补丁

        厂商已发布了更新来解决某些版本中的这个问题。请参阅厂商公告了解更多详细信息。

- 漏洞信息

23247
BlackBerry Enterprise Server Word DOC Processing Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-11 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站