CVE-2006-2655
CVSS6.4
发布时间 :2006-06-01 21:02:00
修订时间 :2008-09-05 17:05:05
NMCOS    

[原文]The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.


[CNNVD]FreeBSD ypserv 访问控制绕过漏洞(CNNVD-200606-037)

        FreeBSD就是一种运行在Intel平台上、可以自由使用的开放源码Unix类系统。
        FreeBSD的ypserv的访问控制实现上存在漏洞,远程攻击者可能利用此漏洞绕过访问控制。
        有两种记录的方法限制通过ypserv(8)对NIS映射的访问:通过使用/var/yp/securenets文件和/etc/hosts.allow文件。尽管服务程序中实现了这两种机制,但编译过程中的更改导致无意中禁用了securenets访问限制。
        ypserv(8)不会加载或处理/var/yp/securenets文件中所指定的任何网络或主机,导致这些访问控制失效。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:5.3:release
cpe:/o:freebsd:freebsd:6.0:stable
cpe:/o:freebsd:freebsd:5.4:pre-release
cpe:/o:freebsd:freebsd:5.4FreeBSD 5.4
cpe:/o:freebsd:freebsd:5.3FreeBSD 5.3
cpe:/o:freebsd:freebsd:5.3:stable
cpe:/o:freebsd:freebsd:5.4:releng
cpe:/o:freebsd:freebsd:6.1:stable
cpe:/o:freebsd:freebsd:6.1:release
cpe:/o:freebsd:freebsd:6.1FreeBSD 6.1
cpe:/o:freebsd:freebsd:5.3:releng
cpe:/o:freebsd:freebsd:5.4:stable
cpe:/o:freebsd:freebsd:5.4:release
cpe:/o:freebsd:freebsd:6.0FreeBSD 6.0
cpe:/o:freebsd:freebsd:6.0:release

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2655
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2655
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-037
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18204
(PATCH)  BID  18204
http://security.freebsd.org/advisories/FreeBSD-SA-06:15.ypserv.asc
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-06:15
http://secunia.com/advisories/20389
(VENDOR_ADVISORY)  SECUNIA  20389
http://xforce.iss.net/xforce/xfdb/26792
(UNKNOWN)  XF  freebsd-ypserv-security-bypass(26792)
http://www.osvdb.org/25852
(UNKNOWN)  OSVDB  25852
http://securitytracker.com/id?1016193
(UNKNOWN)  SECTRACK  1016193

- 漏洞信息

FreeBSD ypserv 访问控制绕过漏洞
中危 设计错误
2006-06-01 00:00:00 2006-06-01 00:00:00
远程  
        FreeBSD就是一种运行在Intel平台上、可以自由使用的开放源码Unix类系统。
        FreeBSD的ypserv的访问控制实现上存在漏洞,远程攻击者可能利用此漏洞绕过访问控制。
        有两种记录的方法限制通过ypserv(8)对NIS映射的访问:通过使用/var/yp/securenets文件和/etc/hosts.allow文件。尽管服务程序中实现了这两种机制,但编译过程中的更改导致无意中禁用了securenets访问限制。
        ypserv(8)不会加载或处理/var/yp/securenets文件中所指定的任何网络或主机,导致这些访问控制失效。

- 公告与补丁

        暂无数据

- 漏洞信息

25852
FreeBSD ypserv securenets Access Control Failure
Remote / Network Access Misconfiguration
Loss of Integrity

- 漏洞描述

FreeBSD contains a flaw that may allow "securenets" access restrictions to be inadvertantly disabled. The issue is triggered when a change in the build process caused ypserv to fail to load or process the networks and hosts specified in the /var/yp/securenets file. It is possible that the flaw may allow access to NIS maps resulting in a loss of integrity.

- 时间线

2006-05-31 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 5-STABLE or 6-STABLE, or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, or RELENG_5_3 security branch dated after the correction date or higher, as it has been reported to fix this vulnerability. In addition, FreeBSD has released a patch for some older versions. It is also possible to correct the flaw by implementing the following workaround: use /etc/hosts.allow for access control or configure a firewall to restrict access.

- 相关参考

- 漏洞作者

- 漏洞信息

FreeBSD YPServ Inoperative Access Control Vulnerability
Design Error 18204
Yes No
2006-06-01 12:00:00 2006-06-01 09:12:00
Hokan is credited with the discovery of this vulnerability.

- 受影响的程序版本

FreeBSD FreeBSD 6.0 -STABLE
FreeBSD FreeBSD 6.0 -RELEASE
FreeBSD FreeBSD 5.4 -RELENG
FreeBSD FreeBSD 5.4 -RELEASE
FreeBSD FreeBSD 5.4 -PRERELEASE
FreeBSD FreeBSD 5.3 -STABLE
FreeBSD FreeBSD 5.3 -RELENG
FreeBSD FreeBSD 5.3 -RELEASE
FreeBSD FreeBSD 5.3
FreeBSD FreeBSD 5.2.1 -RELEASE
FreeBSD FreeBSD 5.2 -RELENG
FreeBSD FreeBSD 5.2 -RELEASE
FreeBSD FreeBSD 5.2
FreeBSD FreeBSD 5.1 -RELENG
FreeBSD FreeBSD 5.1 -RELEASE/Alpha
FreeBSD FreeBSD 5.1 -RELEASE-p5
FreeBSD FreeBSD 5.1 -RELEASE
FreeBSD FreeBSD 5.1
FreeBSD FreeBSD 5.0 -RELENG
FreeBSD FreeBSD 5.0 -RELEASE-p14
FreeBSD FreeBSD 5.0 alpha
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 6.1 -STABLE
FreeBSD FreeBSD 6.1 -RELEASE
FreeBSD FreeBSD 5.4-STABLE

- 漏洞讨论

FreeBSD ypserv is prone to a vulnerability regarding inoperative access controls.

The problem is due to a failure in ypserv to properly enforce access control restrictions.

This issue results in a false sense of security, since intended access controls aren't properly enforced. Successful exploits may result in the disclosure of sensitive information.

- 漏洞利用

This issue can be exploited using standard network tools.

- 解决方案

FreeBSD has released patches to address this issue.


FreeBSD FreeBSD 6.1 -RELEASE

FreeBSD FreeBSD 5.4-STABLE

FreeBSD FreeBSD 6.1 -STABLE

FreeBSD FreeBSD 5.3 -RELEASE

FreeBSD FreeBSD 5.3 -RELENG

FreeBSD FreeBSD 5.3

FreeBSD FreeBSD 5.3 -STABLE

FreeBSD FreeBSD 5.4 -PRERELEASE

FreeBSD FreeBSD 5.4 -RELEASE

FreeBSD FreeBSD 5.4 -RELENG

FreeBSD FreeBSD 6.0 -RELEASE

FreeBSD FreeBSD 6.0 -STABLE

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站