Linux rpc.statd远程格式串溢出漏洞

漏洞信息详情

Linux rpc.statd远程格式串溢出漏洞

漏洞简介

rpc.statd是一种用于监视并控制NFS的RPC守护进程,广泛运行于种Unix/Linux类操作系统上,程序使用NSM(Network Status Monitor)协议。
某些Linux系统所带的nfs-utils软件包中的rpc.statd程序存在一个格式串溢出漏洞,远程攻击者可以利用此漏洞通过溢出攻击在主机上以root用户的权限执行任意指令。
通过设置特殊的格式化字符串,并在某个buffer中提供可执行代码,可能允许远程攻击者覆盖rpc.statd堆栈中的某个返回地址,远程执行任意命令是可能的。由于rpc.statd通常是以root身份运行,而且没有丢弃root权限,因此溢出代码会以root身份执行。Debian、Red Hat、Connectiva和Mandrake Linux已经发布了安全公告并提供了安全补丁。其他运行rpc.statd的Linux也存在这个问题。幸运的是,默认情况下很多Linux并没有启动rpc.statd服务。

漏洞公告

厂商补丁:
Conectiva
———
Conectiva已经为此发布了一个安全公告(2000-07-17)以及相应补丁:

2000-07-17:nfs-utils

链接:

补丁下载:
Debian
——
Debian已经为此发布了一个安全公告(Debian-00-013)以及相应补丁:

Debian-00-013:New Debian nfs-common packages released

链接:http://www.debian.org/security/2000/debian-” target=”_blank”>
http://www.debian.org/security/2000/debian-

补丁下载:

Source archives:

http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.tar.gz” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.tar.gz

http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.dsc” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.dsc

Alpha architecture:

http://http.us.debian.org/debian/dists/potato/main/binary-alpha/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-alpha/net/nfs-common_0.1.9.1-1.deb

Intel ia32 architecture:

http://http.us.debian.org/debian/dists/potato/main/binary-i386/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-i386/net/nfs-common_0.1.9.1-1.deb

PowerPC architecture:

http://http.us.debian.org/debian/dists/potato/main/binary-powerpc/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-powerpc/net/nfs-common_0.1.9.1-1.deb

Sun Sparc architecture:

http://http.us.debian.org/debian/dists/potato/main/binary-sparc/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-sparc/net/nfs-common_0.1.9.1-1.deb

Debian Unstable alias woody

– —————————

This version of Debian is not yet released. Fixes are currently available

for Alpha, Intel ia32, PowerPC, and the Sun Sparc architecture. Fixes for

other architectures will be available soon.

Source archives:

http://http.us.debian.org/debian/dists/unstable/main/source/net/nfs-utils_0.1.9.1-1.tar.gz” target=”_blank”>
http://http.us.debian.org/debian/dists/unstable/main/source/net/nfs-utils_0.1.9.1-1.tar.gz

http://http.us.debian.” target=”_blank”>
http://http.us.debian.

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade
MandrakeSoft
————
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Linux-Mandrake 7.0:

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.0/RPMS/nfs-utils-0.1.9.1-3mdk.i586.rpm

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.0/RPMS/nfs-utils-clients-0.1.9.1-3mdk.i586.rpm

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.0/SRPMS/nfs-utils-0.1.9.1-3mdk.src.rpm

Linux-Mandrake 7.1:

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.1/RPMS/nfs-utils-0.1.9.1-3mdk.i586.rpm

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.1/RPMS/nfs-utils-clients-0.1.9.1-3mdk.i586.rpm

ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.1/SRPMS/nfs-utils-0.1.9.1-3mdk.src.rpm
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2000:043-03)以及相应补丁:

RHSA-2000:043-03:Revised advisory: Updated package for nfs-utils available

链接:https://www.redhat.com/support/errata/RHSA-2000-043.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2000-043.html

补丁下载:

Red Hat Linux 6.2:

sparc:

ftp://updates.redhat.com/6.2/sparc/nfs-utils-0.1.9.1-1.sparc.rpm

alpha:

ftp://updates.redhat.com/6.2/alpha/nfs-utils-0.1.9.1-1.alpha.rpm

i386:

ftp://updates.redhat.com/6.2/i386/nfs-utils-0.1.9.1-1.i386.rpm

sources:

ftp://updates.redhat.com/6.2/SRPMS/nfs-utils-0.1.9.1-1.src.rpm

可使用下列命令安装补丁:

rpm -Fvh [文件名]
Trustix
——-
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Trustix Trustix Secure Linux 1.1:

Trustix RPM nfs-utils-0.1.9.1-1tr.i586.rpm

ftp://ftp.trustix.com/pub/Trustix/updates/1.1/RPMS/

Trustix Trustix Secure Linux 1.0:

Trustix RPM nfs-utils-0.1.9.1-1tr.i586.rpm

ftp://ftp.trustix.com/pub/Trustix/updates/1.1/RPMS/

参考网址

来源:CERT/CC Advisory: CA-2000-17
名称: CA-2000-17
链接:http://www.cert.org/advisories/CA-2000-17.html

来源: XF
名称: linux-rpcstatd-format-overwrite
链接:http://xforce.iss.net/static/4939.php

来源: BID
名称: 1480
链接:http://www.securityfocus.com/bid/1480

来源: BUGTRAQ
名称: 20000716 Lots and lots of fun with rpc.statd
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html

来源: REDHAT
名称: RHSA-2000:043
链接:http://www.redhat.com/support/errata/RHSA-2000-043.html

来源: CALDERA
名称: CSSA-2000-025.0
链接:http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt

来源: BUGTRAQ
名称: 20000718 [Security Announce] MDKSA-2000:021 nfs-utils update
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html

来源: BUGTRAQ
名称: 20000718 Trustix Security Advisory – nfs-utils
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html

来源: BUGTRAQ
名称: 20000717 CONECTIVA LINUX SECURITY ANNOUNCEMENT – nfs-utils
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html

来源:NSFOCUS
名称:692
链接:http://www.nsfocus.net/vulndb/692

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享