漏洞信息详情
Linux rpc.statd远程格式串溢出漏洞
- CNNVD编号:CNNVD-200007-039
- 危害等级: 超危
- CVE编号:
CVE-2000-0666
- 漏洞类型:
输入验证
- 发布时间:
2000-06-16
- 威胁类型:
远程
- 更新时间:
2005-05-02
- 厂 商:
trustix - 漏洞来源:
Chris Evans※ chris… -
漏洞简介
rpc.statd是一种用于监视并控制NFS的RPC守护进程,广泛运行于种Unix/Linux类操作系统上,程序使用NSM(Network Status Monitor)协议。
某些Linux系统所带的nfs-utils软件包中的rpc.statd程序存在一个格式串溢出漏洞,远程攻击者可以利用此漏洞通过溢出攻击在主机上以root用户的权限执行任意指令。
通过设置特殊的格式化字符串,并在某个buffer中提供可执行代码,可能允许远程攻击者覆盖rpc.statd堆栈中的某个返回地址,远程执行任意命令是可能的。由于rpc.statd通常是以root身份运行,而且没有丢弃root权限,因此溢出代码会以root身份执行。Debian、Red Hat、Connectiva和Mandrake Linux已经发布了安全公告并提供了安全补丁。其他运行rpc.statd的Linux也存在这个问题。幸运的是,默认情况下很多Linux并没有启动rpc.statd服务。
漏洞公告
厂商补丁:
Conectiva
———
Conectiva已经为此发布了一个安全公告(2000-07-17)以及相应补丁:
2000-07-17:nfs-utils
链接:
补丁下载:
Debian
——
Debian已经为此发布了一个安全公告(Debian-00-013)以及相应补丁:
Debian-00-013:New Debian nfs-common packages released
链接:http://www.debian.org/security/2000/debian-” target=”_blank”>
http://www.debian.org/security/2000/debian-
补丁下载:
Source archives:
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.tar.gz” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.tar.gz
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.dsc” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/source/net/nfs-utils_0.1.9.1-1.dsc
Alpha architecture:
http://http.us.debian.org/debian/dists/potato/main/binary-alpha/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-alpha/net/nfs-common_0.1.9.1-1.deb
Intel ia32 architecture:
http://http.us.debian.org/debian/dists/potato/main/binary-i386/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-i386/net/nfs-common_0.1.9.1-1.deb
PowerPC architecture:
http://http.us.debian.org/debian/dists/potato/main/binary-powerpc/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-powerpc/net/nfs-common_0.1.9.1-1.deb
Sun Sparc architecture:
http://http.us.debian.org/debian/dists/potato/main/binary-sparc/net/nfs-common_0.1.9.1-1.deb” target=”_blank”>
http://http.us.debian.org/debian/dists/potato/main/binary-sparc/net/nfs-common_0.1.9.1-1.deb
Debian Unstable alias woody
– —————————
This version of Debian is not yet released. Fixes are currently available
for Alpha, Intel ia32, PowerPC, and the Sun Sparc architecture. Fixes for
other architectures will be available soon.
Source archives:
http://http.us.debian.org/debian/dists/unstable/main/source/net/nfs-utils_0.1.9.1-1.tar.gz” target=”_blank”>
http://http.us.debian.org/debian/dists/unstable/main/source/net/nfs-utils_0.1.9.1-1.tar.gz
http://http.us.debian.” target=”_blank”>
http://http.us.debian.
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
MandrakeSoft
————
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Linux-Mandrake 7.0:
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.0/RPMS/nfs-utils-0.1.9.1-3mdk.i586.rpm
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.0/SRPMS/nfs-utils-0.1.9.1-3mdk.src.rpm
Linux-Mandrake 7.1:
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.1/RPMS/nfs-utils-0.1.9.1-3mdk.i586.rpm
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates/7.1/SRPMS/nfs-utils-0.1.9.1-3mdk.src.rpm
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2000:043-03)以及相应补丁:
RHSA-2000:043-03:Revised advisory: Updated package for nfs-utils available
链接:https://www.redhat.com/support/errata/RHSA-2000-043.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2000-043.html
补丁下载:
Red Hat Linux 6.2:
sparc:
ftp://updates.redhat.com/6.2/sparc/nfs-utils-0.1.9.1-1.sparc.rpm
alpha:
ftp://updates.redhat.com/6.2/alpha/nfs-utils-0.1.9.1-1.alpha.rpm
i386:
ftp://updates.redhat.com/6.2/i386/nfs-utils-0.1.9.1-1.i386.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/nfs-utils-0.1.9.1-1.src.rpm
可使用下列命令安装补丁:
rpm -Fvh [文件名]
Trustix
——-
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Trustix Trustix Secure Linux 1.1:
Trustix RPM nfs-utils-0.1.9.1-1tr.i586.rpm
ftp://ftp.trustix.com/pub/Trustix/updates/1.1/RPMS/
Trustix Trustix Secure Linux 1.0:
Trustix RPM nfs-utils-0.1.9.1-1tr.i586.rpm
参考网址
来源:CERT/CC Advisory: CA-2000-17
名称: CA-2000-17
链接:http://www.cert.org/advisories/CA-2000-17.html
来源: XF
名称: linux-rpcstatd-format-overwrite
链接:http://xforce.iss.net/static/4939.php
来源: BID
名称: 1480
链接:http://www.securityfocus.com/bid/1480
来源: BUGTRAQ
名称: 20000716 Lots and lots of fun with rpc.statd
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html
来源: REDHAT
名称: RHSA-2000:043
链接:http://www.redhat.com/support/errata/RHSA-2000-043.html
来源: CALDERA
名称: CSSA-2000-025.0
链接:http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt
来源: BUGTRAQ
名称: 20000718 [Security Announce] MDKSA-2000:021 nfs-utils update
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html
来源: BUGTRAQ
名称: 20000718 Trustix Security Advisory – nfs-utils
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html
来源: BUGTRAQ
名称: 20000717 CONECTIVA LINUX SECURITY ANNOUNCEMENT – nfs-utils
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html
来源:NSFOCUS
名称:692
链接:http://www.nsfocus.net/vulndb/692