xinetd文件描述符继承本地拒绝服务漏洞

漏洞信息详情

xinetd文件描述符继承本地拒绝服务漏洞

漏洞简介

xinetd是一个来源域BSD inetd的安全替代产品。最初是由panos@cs.colorado.edu开发的。
2.3.4及其以后版本的xinetd将一个信号管道的文件描述符泄漏给了从xinetd启动的服务。这个描述符可以被子进程用来与xinetd通信,这可能导致xinetd完全崩溃,从而造成一个拒绝服务攻击。

漏洞公告

厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-151-1)以及相应补丁:

DSA-151-1:New xinetd packages fix local denial of service

链接:http://www.debian.org/security/2002/dsa-151” target=”_blank”>
http://www.debian.org/security/2002/dsa-151

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2.dsc

Size/MD5 checksum: 596 6e437a7317228d6baaf1013cc060dcd9

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2.diff.gz

Size/MD5 checksum: 34109 ea09f66719c48976345d104c94d8d7a0

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4.orig.tar.gz

Size/MD5 checksum: 270723 8f7ac612910aaf811c4554f4ab40fd65

Alpha architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_alpha.deb

Size/MD5 checksum: 144548 4a380b4e80f789be31e41b3cc1ca6c25

ARM architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_arm.deb

Size/MD5 checksum: 119372 e9f22ebf109fbbb45e2488090b024a78

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_i386.deb

Size/MD5 checksum: 114380 82e2f7248fcec69f1a4390d4e22c799d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_ia64.deb

Size/MD5 checksum: 170536 a0545b8a5b0989e04f1178592aeec414

HP Precision architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_hppa.deb

Size/MD5 checksum: 134914 b2f95d5464fe03115f8b6c88f2587939

Motorola 680×0 architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_m68k.deb

Size/MD5 checksum: 109000 1c59983898111932ed5554708742fd73

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_mips.deb

Size/MD5 checksum: 133488 711b97de8092f465b89a8c3b332c0198

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_mipsel.deb

Size/MD5 checksum: 134214 21ef9ae6317261fade057163cafc7d01

PowerPC architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_powerpc.deb

Size/MD5 checksum: 124404 87b9958221e1bf9048a4d3650cd89e21

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_s390.deb

Size/MD5 checksum: 120268 1248fb8bbb886916c25e2ac5d2523bd4

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/x/xinetd/xinetd_2.3.4-1.2_sparc.deb

Size/MD5 checksum: 124144 055c71fccc937b6784d114cb7860a171

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade
Xinetd
——
目前厂商已经在xientd 2.3.7中修复了这个安全问题,请到厂商的主页下载:

http://www.xinetd.org/xinetd-2.3.7.tar.gz” target=”_blank”>
http://www.xinetd.org/xinetd-2.3.7.tar.gz

参考网址

来源: DEBIAN
名称: DSA-151
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102927065426172&w=2

来源: BID
名称: 5458
链接:http://www.securityfocus.com/bid/5458

来源: REDHAT
名称: RHSA-2003:228
链接:http://www.redhat.com/support/errata/RHSA-2003-228.html

来源: REDHAT
名称: RHSA-2002:196
链接:http://www.redhat.com/support/errata/RHSA-2002-196.html

来源: MANDRAKE
名称: MDKSA-2002:053
链接:http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-053.php

来源: XF
名称: xinetd-signal-leak-dos(9844)
链接:http://www.iss.net/security_center/static/9844.php

来源: BUGTRAQ
名称: 20020814 GLSA: xinetd
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102935383506155&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享