发布时间 :2006-04-25 08:50:00
修订时间 :2017-07-19 21:30:40

[原文]Multiple buffer overflows in abc2ps before 1.3.3 allow user-assisted attackers to execute arbitrary code via crafted ABC music files.

[CNNVD]ABC2PS 多个缓冲区溢出漏洞 (CNNVD-200604-458)

        abc2ps 1.3.3之前的版本中存在的多个缓冲区溢出允许用户辅助攻击者借助于精心设计的ABC音乐文件执行任意代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  17689
(UNKNOWN)  XF  abc2ps-abc-bo(26043)

- 漏洞信息

ABC2PS 多个缓冲区溢出漏洞
中危 缓冲区溢出
2006-04-25 00:00:00 2006-08-28 00:00:00
        abc2ps 1.3.3之前的版本中存在的多个缓冲区溢出允许用户辅助攻击者借助于精心设计的ABC音乐文件执行任意代码。

- 公告与补丁


- 漏洞信息

abc2ps ABC Music File Processing Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-04-25 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ABC2PS ABC Music Files Remote Buffer Overflow Vulnerability
Boundary Condition Error 17689
Yes No
2006-04-25 12:00:00 2006-04-26 07:31:00
Erik Sjlund is credited with the discovery of this vulnerability.

- 受影响的程序版本

Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
abc2ps abc2ps 1.3.3

- 漏洞讨论

The abc2ps application is prone to a remote buffer-overflow vulnerability.

A remote attacker can exploit this issue to execute arbitrary code in the context of a user running the application. As a result, the attacker can gain unauthorized access to the vulnerable computer.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 解决方案

Please see the referenced advisories for information on obtaining and applying the appropriate updates.

Currently we are not aware of any official vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 相关参考