TCPDump畸形NFS包导致缓冲区溢出漏洞

漏洞信息详情

TCPDump畸形NFS包导致缓冲区溢出漏洞

漏洞简介

Tcpdump是一款命令行监视网络通信的工具。
Tcpdump在处理畸形NFS包时存在漏洞,可导致远程攻击者进行缓冲溢出攻击。
攻击者可以提交畸形超大的NFS数据包而导致tcpdump在处理时出现缓冲区溢出,精心构建NFS包可以导致攻击者以tcpdump进程的权限在系统上执行任意指令。
目前尚为发现利用程序存在。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* 不要在不可信的网络上运行tcpdump。
厂商补丁:
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2002:094-08)以及相应补丁:

RHSA-2002:094-08:Updated tcpdump packages fix buffer overflow

链接:https://www.redhat.com/support/errata/RHSA-2002-094.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2002-094.html

补丁下载:

Red Hat Linux 6.2:

SRPMS:

ftp://updates.redhat.com/6.2/en/os/SRPMS/tcpdump-3.6.2-11.6.2.0.src.rpm

alpha:

ftp://updates.redhat.com/6.2/en/os/alpha/tcpdump-3.6.2-11.6.2.0.alpha.rpm

ftp://updates.redhat.com/6.2/en/os/alpha/libpcap-0.6.2-11.6.2.0.alpha.rpm

ftp://updates.redhat.com/6.2/en/os/alpha/arpwatch-2.1a11-11.6.2.0.alpha.rpm

i386:

ftp://updates.redhat.com/6.2/en/os/i386/tcpdump-3.6.2-11.6.2.0.i386.rpm

ftp://updates.redhat.com/6.2/en/os/i386/libpcap-0.6.2-11.6.2.0.i386.rpm

ftp://updates.redhat.com/6.2/en/os/i386/arpwatch-2.1a11-11.6.2.0.i386.rpm

sparc:

ftp://updates.redhat.com/6.2/en/os/sparc/tcpdump-3.6.2-11.6.2.0.sparc.rpm

ftp://updates.redhat.com/6.2/en/os/sparc/libpcap-0.6.2-11.6.2.0.sparc.rpm

ftp://updates.redhat.com/6.2/en/os/sparc/arpwatch-2.1a11-11.6.2.0.sparc.rpm

Red Hat Linux 7.0:

SRPMS:

ftp://updates.redhat.com/7.0/en/os/SRPMS/tcpdump-3.6.2-11.7.0.0.src.rpm

alpha:

ftp://updates.redhat.com/7.0/en/os/alpha/tcpdump-3.6.2-11.7.0.0.alpha.rpm

ftp://updates.redhat.com/7.0/en/os/alpha/libpcap-0.6.2-11.7.0.0.alpha.rpm

ftp://updates.redhat.com/7.0/en/os/alpha/arpwatch-2.1a11-11.7.0.0.alpha.rpm

i386:

ftp://updates.redhat.com/7.0/en/os/i386/tcpdump-3.6.2-11.7.0.0.i386.rpm

ftp://updates.redhat.com/7.0/en/os/i386/libpcap-0.6.2-11.7.0.0.i386.rpm

ftp://updates.redhat.com/7.0/en/os/i386/arpwatch-2.1a11-11.7.0.0.i386.rpm

Red Hat Linux 7.1:

SRPMS:

ftp://updates.redhat.com/7.1/en/os/SRPMS/tcpdump-3.6.2-11.7.1.0.src.rpm

alpha:

ftp://updates.redhat.com/7.1/en/os/alpha/tcpdump-3.6.2-11.7.1.0.alpha.rpm

ftp://updates.redhat.com/7.1/en/os/alpha/libpcap-0.6.2-11.7.1.0.alpha.rpm

ftp://updates.redhat.com/7.1/en/os/alpha/arpwatch-2.1a11-11.7.1.0.alpha.rpm

i386:

ftp://updates.redhat.com/7.1/en/os/i386/tcpdump-3.6.2-11.7.1.0.i386.rpm

ftp://updates.redhat.com/7.1/en/os/i386/libpcap-0.6.2-11.7.1.0.i386.rpm

ftp://updates.redhat.com/7.1/en/os/i386/arpwatch-2.1a11-11.7.1.0.i386.rpm

ia64:

ftp://updates.redhat.com/7.1/en/os/ia64/tcpdump-3.6.2-11.7.1.0.ia64.rpm

ftp://updates.redhat.com/7.1/en/os/ia64/libpcap-0.6.2-11.7.1.0.ia64.rpm

ftp://updates.redhat.com/7.1/en/os/ia64/arpwatch-2.1a11-11.7.1.0.ia64.rpm

Red Hat Linux 7.2:

SRPMS:

ftp://updates.redhat.com/7.2/en/os/SRPMS/tcpdump-3.6.2-11.7.2.0.src.rpm

i386:

ftp://updates.redhat.com/7.2/en/os/i386/tcpdump-3.6.2-11.7.2.0.i386.rpm

ftp://updates.redhat.com/7.2/en/os/i386/libpcap-0.6.2-11.7.2.0.i386.rpm

ftp://updates.redhat.com/7.2/en/os/i386/arpwatch-2.1a11-11.7.2.0.i386.rpm

ia64:

ftp://updates.redhat.com/7.2/en/os/ia64/tcpdump-3.6.2-11.7.2.0.ia64.rpm

ftp://updates.redhat.com/7.2/en/os/ia64/libpcap-0.6.2-11.7.2.0.ia64.rpm

ftp://updates.redhat.com/7.2/en/os/ia64/arpwatch-2.1a11-11.7.2.0.ia64.rpm

可使用下列命令安装补丁:

rpm -Fvh [文件名]
S.u.S.E.
——–
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2002:020)以及相应补丁:

SuSE-SA:2002:020:tcpdump/libpcap

链接:http://www.suse.com/de/support/security/2002_020_tcpdump_txt.txt” target=”_blank”>
http://www.suse.com/de/support/security/2002_020_tcpdump_txt.txt

补丁下载:

i386 Intel Platform:

SuSE-8.0

ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/tcpdump-3.6.2-300.i386.rpm

source rpm:

ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/tcpdump-3.6.2-300.src.rpm

SuSE-7.3

ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/tcpdump-3.6.2-300.i386.rpm

source rpm:

ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/tcpdump-3.6.2-300.src.rpm

SuSE-7.2

ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/tcpdump-3.4a6-376.i386.rpm

source rpm:

ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/tcpdump-3.4a6-376.src.rpm

SuSE-7.1


来源: XF
名称: tcpdump-nfs-bo(9216)
链接:http://www.iss.net/security_center/static/9216.php

来源: BID
名称: 4890
链接:http://www.securityfocus.com/bid/4890

来源: REDHAT
名称: RHSA-2003:214
链接:http://www.redhat.com/support/errata/RHSA-2003-214.html

来源: REDHAT
名称: RHSA-2002:121
链接:http://www.redhat.com/support/errata/RHSA-2002-121.html

来源: REDHAT
名称: RHSA-2002:094
链接:http://www.redhat.com/support/errata/RHSA-2002-094.html

来源: DEBIAN
名称: DSA-255
链接:http://www.debian.org/security/2003/dsa-255

来源: HP
名称: HPSBTL0205-044
链接:http://online.securityfocus.com/advisories/4169

来源: FREEBSD
名称: FreeBSD-SA-02:29
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102650721503642&w=2

来源: BUGTRAQ
名称: 20020606 TSLSA-2002-0055 – tcpdump
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102339541014226&w=2

来源: CONECTIVA
名称: CLA-2002:491
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000491

来源: CALDERA
名称: CSSA-2002-025.0
链接:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-025.0.txt

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享