漏洞信息详情
CFS多个缓冲区溢出漏洞
- CNNVD编号:CNNVD-200206-093
- 危害等级: 高危
![图片[1]-CFS多个缓冲区溢出漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-11/bbdd3e8868c10d22861b2275d65f4500.png)
- CVE编号:
CVE-2002-0351
- 漏洞类型:
边界条件错误
- 发布时间:
2002-03-02
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
matt_blaze - 漏洞来源:
Zorgon※ zorgon@lin… -
漏洞简介
加密文件系统(Cryptographic File System)是一个运行于Unix类系统上的一个文件系统加密软件包。
CFS实现上存在多个缓冲区溢出漏洞,远程攻击者可能利用这些漏洞对程序实施拒绝服务攻击或在主机上以root身份执行任意命令。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* 对cfsd服务端口设置访问过滤,只允许可信用户进行访问。
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-116-1)以及相应补丁:
DSA-116-1:New CFS packages fix security problems
链接:http://www.debian.org/security/2002/dsa-116” target=”_blank”>
http://www.debian.org/security/2002/dsa-116
补丁下载:
Source archives:
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3-8.1.dsc” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3-8.1.dsc
MD5 checksum: 566d05bb6f71e3a5dd194a0ceb98952a
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3-8.1.diff.gz” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3-8.1.diff.gz
MD5 checksum: 7bb4cbf19e8c195f7302a025897fe44d
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3.orig.tar.gz” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/source/cfs_1.3.3.orig.tar.gz
MD5 checksum: cb4c5c107b77a50c25628f6655aae378
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/cfs_1.3.3-8.1_alpha.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-alpha/cfs_1.3.3-8.1_alpha.deb
MD5 checksum: 2d5b24107abe81a09d5dbd213f0d890b
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/cfs_1.3.3-8.1_arm.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-arm/cfs_1.3.3-8.1_arm.deb
MD5 checksum: 7712a474e4c67ce30b2a70b29a3f0f64
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/cfs_1.3.3-8.1_i386.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-i386/cfs_1.3.3-8.1_i386.deb
MD5 checksum: 33651b606e1fa0dc15c9d7256580df84
Motorola 680×0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/cfs_1.3.3-8.1_m68k.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-m68k/cfs_1.3.3-8.1_m68k.deb
MD5 checksum: e6078a08a26fe831b3acfddcb6f3c8cd
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/cfs_1.3.3-8.1_powerpc.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-powerpc/cfs_1.3.3-8.1_powerpc.deb
MD5 checksum: cc13eb33869b2682685b5f073cd33b3c
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/cfs_1.3.3-8.1_sparc.deb” target=”_blank”>
http://security.debian.org/dists/stable/updates/main/binary-sparc/cfs_1.3.3-8.1_sparc.deb
MD5 checksum: 55ef017e1d3b2ca20fe5c0cf30479901
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
参考网址
来源: DEBIAN
名称: DSA-116
链接:http://www.debian.org/security/2002/dsa-116
来源: XF
名称: cfs-bo(8330)
链接:http://www.iss.net/security_center/static/8330.php
来源: BID
名称: 4219
链接:http://www.securityfocus.com/bid/4219






















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)