漏洞信息详情
AT 畸形时间格式导致堆溢出漏洞
- CNNVD编号:CNNVD-200202-012
- 危害等级: 高危
- CVE编号:
CVE-2002-0004
- 漏洞类型:
未知
- 发布时间:
2002-01-16
- 威胁类型:
本地
- 更新时间:
2005-10-12
- 厂 商:
freebsd - 漏洞来源:
zen-parse※ zen-par… -
漏洞简介
/usr/bin/at是一种免费获取使用的开放源代码的软件包,用于定时执行应用程序。许多Unix、Linux操作系统都携带了这种软件包。一般情况下/usr/bin/at都设置了suid root属性。
at程序存在输入验证漏洞,可能使本地攻击者获取主机的root权限。
当从命令行接收到某些特殊的时间格式进行处理时,由于错误地对同一内存区域做了两次释放动作,可能导致某些堆区数据被破坏或重写,本地攻击者可能利用这个漏洞获取root权限。
执行\”/usr/bin/at 31337 + vuln\”,如果你所在系统受此问题影响,将会看到\”Segmentation fault\”,否则应该看到类似信息\”Garbled time\”(可能带有其他信息)。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* 在漏洞修补之前暂时去掉at程序的suid root位。
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-102-1)以及相应补丁:
DSA-102-1:at daemon exploit
链接:http://www.debian.org/security/2002/dsa-102” target=”_blank”>
http://www.debian.org/security/2002/dsa-102
补丁下载:
Debian GNU/Linux 2.2 alias potato
– ————————————
Source archives:
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8-10.1.dsc” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8-10.1.dsc
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8-10.1.diff.gz” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8-10.1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8.orig.tar.gz” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/at_3.1.8.orig.tar.gz
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/at_3.1.8-10.1_alpha.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-alpha/at_3.1.8-10.1_alpha.deb
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/at_3.1.8-10.1_arm.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-arm/at_3.1.8-10.1_arm.deb
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/at_3.1.8-10.1_i386.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-i386/at_3.1.8-10.1_i386.deb
Motorola 680×0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/at_3.1.8-10.1_m68k.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-m68k/at_3.1.8-10.1_m68k.deb
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/at_3.1.8-10.1_powerpc.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-powerpc/at_3.1.8-10.1_powerpc.deb
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/at_3.1.8-10.1_sparc.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-sparc/at_3.1.8-10.1_sparc.deb
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
MandrakeSoft
————
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2002:007)以及相应补丁:
MDKSA-2002:007:at update
链接:http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-007.php3” target=”_blank”>
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-007.php3
补丁下载:
________________________________________________________________________
Updated Packages:
Mandrake Linux 8.1:
066814fda6dfc8f74721861a90c1d167 8.1/RPMS/at-3.1.8-4.1mdk.i586.rpm
8205596ce7b87d8dca57a6d9285dd1d1 8.1/SRPMS/at-3.1.8-4.1mdk.src.rpm
Mandrake Linux 8.1/ia64:
bc46bc259124e1de45063503d8be2940 ia64/8.1/RPMS/at-3.1.8-4.1mdk.ia64.rpm
8205596ce7b87d8dca57a6d9285dd1d1 ia64/8.1/SRPMS/at-3.1.8-4.1mdk.src.rpm
________________________________________________________________________
上述升级软件可以在下列地址中的任意一个镜像ftp服务器上下载:
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2002:015-13)以及相应补丁:
RHSA-2002:015-13:Updated at package available
链接:https://www.redhat.com/support/errata/RHSA-2002-015.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2002-015.html
注:RedHat 7.2不受此安全漏洞影响,但是仍存在其他的一些问题,因此RedHat仍然提供了升级程序。
补丁下载:
Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/at-3.1.8-22.1.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/at-3.1.8-22.1.alpha.rpm
i386:
ftp://updates.redhat.com/6.2/en/os/i386/at-3.1.8-22.1.i386.rpm
sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/at-3.1.8-22.1.sparc.rpm
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/at-3.1.8-23.src.rpm
alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/at-3.1.8-23.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/en/os/i386/at-3.1.8-23.i386.rpm
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/at-3.1.8-23.src.rpm
alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/at-3.1.8-23.alpha.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/at-3.1.8-23.i386.rpm
ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/at-3.1.8-23.ia64.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/at-3.1.8-23.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/at-3.1.8-23.i386.rpm
ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/at-3.1.8-23.ia64.rpm
可使用下列命令安装补丁:
rpm -Fvh [文件名]
S.u.S.E.
——–
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2002:003)以及相应补丁:
SuSE-SA:2002:003:at
链接:http://www.suse.com/de/support/security/2002_003_at_txt.txt” target=”_blank”>
http://www.suse.com/de/support/security/2002_003_at_txt.txt
补丁下载:
i386 Intel Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap1/at-3.1.8-459.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/at-3.1.8-459.src.rpm
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/ap1/at-3.1.8-458.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/at-3.1.8-458.src.rpm
SuSE-7.1
来源: BID
名称: 3886
链接:http://www.securityfocus.com/bid/3886
来源: REDHAT
名称: RHSA-2002:015
链接:http://www.redhat.com/support/errata/RHSA-2002-015.html
来源: DEBIAN
名称: DSA-102
链接:http://www.debian.org/security/2002/dsa-102
来源: BUGTRAQ
名称: 20020117 ‘/usr/bin/at 31337 + vuln’ problem + exploit
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=101128661602088&w=2
来源: XF
名称: linux-at-exetime-heap-corruption(7909)
链接:http://xforce.iss.net/xforce/xfdb/7909
来源: SUSE
名称: SuSE-SA:2002:003
链接:http://www.novell.com/linux/security/advisories/2002_003_at_txt.html
来源: HP
名称: HPSBTL0302-034
链接:http://online.securityfocus.com/advisories/3969
来源: HP
名称: HPSBTL0201-021
链接:http://online.securityfocus.com/advisories/3833
来源: MANDRAKE
名称: MDKSA-2002:007
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=101147632721031&w=2