CVE-2006-1550
CVSS7.6
发布时间 :2006-03-30 18:02:00
修订时间 :2010-08-21 00:00:00
NMCOS    

[原文]Multiple buffer overflows in the xfig import code (xfig-import.c) in Dia 0.87 and later before 0.95-pre6 allow user-assisted attackers to have an unknown impact via a crafted xfig file, possibly involving an invalid (1) color index, (2) number of points, or (3) depth.


[CNNVD]DIA XFIG文件输入多个远程缓冲区溢出漏洞(CNNVD-200603-504)

        在Dia 0.87和后续0.95-pre6之前版本的xfig输入代码(xfig-import.c)中存在多个缓冲区溢出,用户协助式攻击者可通过以下途径施加一个不明影响:一个伪xfig文件,可能与一个无效的(1) color索引,(2)points数量,或(3) depth有关。

- CVSS (基础分值)

CVSS分值: 7.6 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

cpe:/a:dia:dia:0.93
cpe:/a:dia:dia:0.87
cpe:/a:dia:dia:0.92.2
cpe:/a:dia:dia:0.91
cpe:/a:dia:dia:0.88.1
cpe:/a:dia:dia:0.94

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10361Multiple buffer overflows in the xfig import code (xfig-import.c) in Dia 0.87 and later before 0.95-pre6 allow user-assisted attackers to ha...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1550
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-504
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17310
(PATCH)  BID  17310
http://xforce.iss.net/xforce/xfdb/25566
(UNKNOWN)  XF  diaxfig-xfig-import-bo(25566)
http://www.ubuntulinux.org/support/documentation/usn/usn-266-1
(UNKNOWN)  UBUNTU  USN-266-1
http://www.securityfocus.com/archive/1/archive/1/429357/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060329 Buffer overflows in Dia XFig import
http://www.redhat.com/support/errata/RHSA-2006-0280.html
(UNKNOWN)  REDHAT  RHSA-2006:0280
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00021.html
(UNKNOWN)  FEDORA  FEDORA-2006-261
http://www.novell.com/linux/security/advisories/2006_04_28.html
(UNKNOWN)  SUSE  SUSE-SR:2006:009
http://www.mandriva.com/security/advisories?name=MDKSA-2006:062
(UNKNOWN)  MANDRIVA  MDKSA-2006:062
http://www.gentoo.org/security/en/glsa/glsa-200604-14.xml
(UNKNOWN)  GENTOO  GLSA-200604-14
http://www.debian.org/security/2006/dsa-1025
(UNKNOWN)  DEBIAN  DSA-1025
http://securitytracker.com/id?1015853
(UNKNOWN)  SECTRACK  1015853
http://secunia.com/advisories/19959
(VENDOR_ADVISORY)  SECUNIA  19959
http://secunia.com/advisories/19897
(VENDOR_ADVISORY)  SECUNIA  19897
http://secunia.com/advisories/19765
(VENDOR_ADVISORY)  SECUNIA  19765
http://secunia.com/advisories/19546
(VENDOR_ADVISORY)  SECUNIA  19546
http://secunia.com/advisories/19543
(VENDOR_ADVISORY)  SECUNIA  19543
http://secunia.com/advisories/19507
(VENDOR_ADVISORY)  SECUNIA  19507
http://secunia.com/advisories/19505
(VENDOR_ADVISORY)  SECUNIA  19505
http://secunia.com/advisories/19469
(VENDOR_ADVISORY)  SECUNIA  19469
http://mail.gnome.org/archives/dia-list/2006-March/msg00149.html
(UNKNOWN)  MLIST  [dia-list] 20060329 Vulnerability in xfig import code

- 漏洞信息

DIA XFIG文件输入多个远程缓冲区溢出漏洞
高危 缓冲区溢出
2006-03-30 00:00:00 2006-08-28 00:00:00
远程  
        在Dia 0.87和后续0.95-pre6之前版本的xfig输入代码(xfig-import.c)中存在多个缓冲区溢出,用户协助式攻击者可通过以下途径施加一个不明影响:一个伪xfig文件,可能与一个无效的(1) color索引,(2)points数量,或(3) depth有关。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        DIA DIA 0.94
        Mandriva dia-0.94-6.2.20060mdk.i586.rpm
        Mandriva Linux 2006.0:
        http://wwwnew.mandriva.com/en/downloads/
        Mandriva dia-0.94-6.2.20060mdk.x86_64.rpm
        Mandriva Linux 2006.0/X86_64:
        http://wwwnew.mandriva.com/en/downloads/
        RedHat Fedora dia-0.94-13.fc4.i386.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        RedHat Fedora dia-0.94-13.fc4.ppc.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        RedHat Fedora dia-0.94-13.fc4.x86_64.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        RedHat Fedora dia-debuginfo-0.94-13.fc4.i386.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        RedHat Fedora dia-debuginfo-0.94-13.fc4.ppc.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        RedHat Fedora dia-debuginfo-0.94-13.fc4.x86_64.rpm
        Fedora Core 4
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
        Ubuntu dia-common_0.94.0-11ubuntu1.1_all.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-11 ubuntu1.1_all.deb
        Ubuntu dia-common_0.94.0-5ubuntu1.2_all.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-5u buntu1.2_all.deb
        Ubuntu dia-gnome_0.94.0-11ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_amd64.deb
        Ubuntu dia-gnome_0.94.0-11ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_i386.deb
        Ubuntu dia-gnome_0.94.0-11ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_powerpc.deb
        Ubuntu dia-gnome_0.94.0-5ubuntu1.2_amd64.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_amd64.deb
        Ubuntu dia-gnome_0.94.0-5ubuntu1.2_i386.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_i386.deb
        Ubuntu dia-gnome_0.94.0-5ubuntu1.2_powerpc.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_powerpc.deb
        Ubuntu dia-libs_0.94.0-11ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_amd64.deb
        Ubuntu dia-libs_0.94.0-11ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_i386.deb
        Ubuntu dia-libs_0.94.0-11ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_powerpc.deb
        Ubuntu dia-libs_0.94.0-5ubuntu1.2_amd64.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_amd64.deb
        Ubuntu dia-libs_0.94.0-5ubuntu1.2_i386.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_i386.deb
        Ubuntu dia-libs_0.94.0-5ubuntu1.2_powerpc.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_powerpc.deb
        Ubuntu dia_0.94.0-11ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_amd64.deb
        Ubuntu dia_0.94.0-11ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_i386.deb
        Ubuntu dia_0.94.0-11ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_powerpc.deb
        Ubuntu dia_0.94.0-5ubuntu1.2_amd64.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_amd64.deb
        Ubuntu dia_0.94.0-5ubuntu1.2_i386.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_i386.deb
        Ubuntu dia_0.94.0-5ubuntu1.2_powerpc.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_powerpc.deb
        DIA DIA 0.93
        Ubuntu dia-common_0.93-4ubuntu2.1_all.deb
        Ubuntu 4.10:
        http://security.

- 漏洞信息

24294
Dia XFig Import Plugin Multiple Overflows
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-03-29 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
Boundary Condition Error 17310
Yes No
2006-03-29 12:00:00 2006-12-07 10:24:00
Discovery is credited to infamous41md.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core4
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Gentoo Linux
DIA DIA 0.92.2
DIA DIA 0.88.1
DIA DIA 0.94
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
+ Ubuntu Ubuntu Linux 5.0 4 amd64
DIA DIA 0.93
DIA DIA 0.91
DIA DIA 0.87
DIA DIA 0.95-pre6

- 不受影响的程序版本

DIA DIA 0.95-pre6

- 漏洞讨论

Dia is affected by multiple remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it into insufficiently sized memory buffers.

These issues allow remote attackers to execute arbitrary machine code in the context of the user running the affected application to open attacker-supplied malicious XFig files.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

The vendor has released version 0.95-pre6 along with a patch for 0.94 to address these issues.

Version 0.95-pre6 is available from the Gnome CVS tree. The patch is available in the Gnome web reference (Vulnerability in xfig import code).

Please see the references for more information and vendor advisories.


DIA DIA 0.94

DIA DIA 0.93

DIA DIA 0.92.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站