发布时间 :2006-03-21 21:02:00
修订时间 :2008-09-05 17:01:41

[原文]Stack-based buffer overflow in the count_vcards function in LibVC 3, as used in Rolo, allows user-assisted attackers to execute arbitrary code via a vCard file (e.g. contacts.vcf) containing a long line.

[CNNVD]LibVC VCard 处理缓冲区溢出漏洞(CNNVD-200603-369)

        在LibVC 3的count_vcards函数中存在基于堆栈的缓冲区溢出,当用于Rolo时,用户协助式攻击者可通过一个带有长行的vCard文件(如:contacts.vcf)执行任意代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  libvc-vc-bo(25430)
(UNKNOWN)  BID  17237

- 漏洞信息

LibVC VCard 处理缓冲区溢出漏洞
中危 缓冲区溢出
2006-03-21 00:00:00 2006-08-28 00:00:00
        在LibVC 3的count_vcards函数中存在基于堆栈的缓冲区溢出,当用于Rolo时,用户协助式攻击者可通过一个带有长行的vCard文件(如:contacts.vcf)执行任意代码。

- 公告与补丁


- 漏洞信息

LibVC (vCard) count_vcards() Function Local Overflow
Local Access Required Input Manipulation
Loss of Integrity

- 漏洞描述

An overflow exists in LibVC. LibVC fails to validate that the size of a string fscanf'd into the local 'buf' is smaller than 256 bytes resulting in a stack overflow. With a specially crafted vCard, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2006-03-21 2006-03-10
Unknow Unknow

- 解决方案

The vendor has temporarily discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.

- 相关参考

- 漏洞作者

- 漏洞信息

LibVC VCard Processing Buffer Overflow Vulnerability
Boundary Condition Error 17237
Yes No
2006-03-21 12:00:00 2006-03-27 10:24:00
trew <> is credited with the discovery of this vulnerability.

- 受影响的程序版本

Rolo Rolo 011
LibVC LibVC 003

- 漏洞讨论

LibVC is prone to a buffer-overflow vulnerability. This issue is due to a failure in the library to perform proper bounds checks on user-supplied data before using it in a finite-sized buffer.

The issue occurs when the application handles excessive data supplied with a vcard file.

An attacker can exploit this issue to crash the affected library, effectively denying service. Arbitrary code execution is also possible, which may facilitate a compromise of the underlying system.

- 漏洞利用

Currently, we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

The following proof of concept is available:

[example file]
F:<bunch of a's>
[/example file]

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 相关参考