CVE-2006-0855
CVSS5.1
发布时间 :2006-02-23 16:02:00
修订时间 :2011-08-01 00:00:00
NMCOPS    

[原文]Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.


[CNNVD]zoo misc.c缓冲区溢出漏洞(CNNVD-200602-353)

        zoo是用于维护文件集的文件压缩工具。
        zoo在处理文件名时存在缓冲区溢出漏洞,攻击者可能利用此漏洞在机器上执行任意指令。
        zoo中的fullpath()/misc.c接受指向目录项的指针并返回组合的目录名和文件名。fullpath()调用combine()/misc.c函数,并假设返回字符串长度不会大于256字节,但事实上该字符串可能大于512字节。
        如果字符串事实上大于256字节的话,就会在fullpath()/misc.c函数中溢出静态变量,之后的strcpy()操作中会在栈上256字节的目标缓冲区上使用这个字符串。因此攻击者可以轻易的覆盖EIP,从而控制程序的流程。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0855
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-353
(官方数据源) CNNVD

- 其它链接及资源

http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200603-05
http://www.debian.org/security/2006/dsa-991
(VENDOR_ADVISORY)  DEBIAN  DSA-991
http://securitytracker.com/id?1015866
(PATCH)  SECTRACK  1015866
http://secunia.com/advisories/19514
(VENDOR_ADVISORY)  SECUNIA  19514
http://secunia.com/advisories/19166
(VENDOR_ADVISORY)  SECUNIA  19166
http://xforce.iss.net/xforce/xfdb/24904
(UNKNOWN)  XF  zoo-misc-bo(24904)
http://www.vupen.com/english/advisories/2006/1220
(VENDOR_ADVISORY)  VUPEN  ADV-2006-1220
http://www.vupen.com/english/advisories/2006/0705
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0705
http://www.securityfocus.com/bid/16790
(UNKNOWN)  BID  16790
http://www.securityfocus.com/archive/1/archive/1/425887/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060223 zoo contains exploitable buffer overflows
http://www.novell.com/linux/security/advisories/2006_06_sr.html
(VENDOR_ADVISORY)  SUSE  SUSE-SR:2006:006
http://www.novell.com/linux/security/advisories/2006_05_sr.html
(VENDOR_ADVISORY)  SUSE  SUSE-SR:2006:005
http://www.guay-leroux.com/projects/zoo-advisory.txt
(VENDOR_ADVISORY)  MISC  http://www.guay-leroux.com/projects/zoo-advisory.txt
http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt
(VENDOR_ADVISORY)  MISC  http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt
http://securitytracker.com/id?1015668
(UNKNOWN)  SECTRACK  1015668
http://securityreason.com/securityalert/546
(UNKNOWN)  SREASON  546
http://secunia.com/advisories/19408
(VENDOR_ADVISORY)  SECUNIA  19408
http://secunia.com/advisories/19148
(VENDOR_ADVISORY)  SECUNIA  19148
http://secunia.com/advisories/19130
(VENDOR_ADVISORY)  SECUNIA  19130
http://secunia.com/advisories/19002
(VENDOR_ADVISORY)  SECUNIA  19002
http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html
(VENDOR_ADVISORY)  BUGTRAQ  20060403 Barracuda ZOO archiver security bug leads to remote compromise

- 漏洞信息

zoo misc.c缓冲区溢出漏洞
中危 缓冲区溢出
2006-02-23 00:00:00 2006-08-28 00:00:00
远程  
        zoo是用于维护文件集的文件压缩工具。
        zoo在处理文件名时存在缓冲区溢出漏洞,攻击者可能利用此漏洞在机器上执行任意指令。
        zoo中的fullpath()/misc.c接受指向目录项的指针并返回组合的目录名和文件名。fullpath()调用combine()/misc.c函数,并假设返回字符串长度不会大于256字节,但事实上该字符串可能大于512字节。
        如果字符串事实上大于256字节的话,就会在fullpath()/misc.c函数中溢出静态变量,之后的strcpy()操作中会在栈上256字节的目标缓冲区上使用这个字符串。因此攻击者可以轻易的覆盖EIP,从而控制程序的流程。

- 公告与补丁

        暂无数据

- 漏洞信息 (F44563)

Debian Linux Security Advisory 991-1 (PacketStormID:F44563)
2006-03-11 00:00:00
Debian  debian.org
advisory,overflow,arbitrary
linux,debian
CVE-2006-0855
[点击下载]

Debian Security Advisory DSA 991-1 - Jean-Sebastien Guay-Leroux discovered a buffer overflow in zoo, a utility to manipulate zoo archives, that could lead to the execution of arbitrary code when unpacking a specially crafted zoo archive.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 991-1                     security@debian.org
http://www.debian.org/security/                                 Steve Kemp
March 10th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : zoo
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2006-0855
BugTraq ID     : 16790

Jean-S    

- 漏洞信息

23460
Zoo fullpath() File Name Handling Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-22 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Zoo Misc.c Buffer Overflow Vulnerability
Boundary Condition Error 16790
Yes No
2006-02-23 12:00:00 2006-12-12 09:33:00
Jean-Sebastien Guay-Leroux is credited with the discovery of this vulnerability.

- 受影响的程序版本

Zoo Zoo 2.10
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
Slackware Linux 10.2
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. SuSE Linux Open-Xchange 4.1
S.u.S.E. SUSE CORE 9 for x86
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 7.3
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
Barracuda Networks Barracuda Spam Firewall 3.1.18 firmware
Barracuda Networks Barracuda Spam Firewall 3.1.17 firmware
Barracuda Networks Barracuda Spam Firewall 3.3.03.022 firmware

- 不受影响的程序版本

Barracuda Networks Barracuda Spam Firewall 3.3.03.022 firmware

- 漏洞讨论

Zoo is prone to a buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before using it in a finite-sized buffer.

An attacker can exploit this issue to execute arbitrary code in the context of the victim user running the affected application.

- 漏洞利用

This vulnerability can be tested using the PIRANA exploitation framework available at the following location:

http://www.guay-leroux.com/projects/pirana-0.2.1.tar.gz

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com.

Please see the referenced vendor advisories for more information and fixes.


Zoo Zoo 2.10

Slackware Linux 10.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站