漏洞信息详情
多个供应商libc DNS分解器信息泄露漏洞
- CNNVD编号:CNNVD-200210-277
- 危害等级: 中危
- CVE编号:
CVE-2002-1146
- 漏洞类型:
缓冲区溢出
- 发布时间:
2002-10-11
- 威胁类型:
远程
- 更新时间:
2005-10-12
- 厂 商:
gnu - 漏洞来源:
Discovery of this … -
漏洞简介
The BIND 4版本和BIND 8.2.x版本的存根分解器函数库,以及例如glibc 2.2.5版本和之前版本、libc和libresolv的其他函数库在处理DNS回复时使用最大值缓冲区容量而不是实际容量,导致存根分解器越过实际边界读取(\”read buffer overflow\”),远程攻击者可以导致服务拒绝(崩溃)。
漏洞公告
Sun have released a security update to address this issue in the RAQ XTR. Please see references section for further details. A fix is linked below.
HP has released a revised advisory (HPSBUX0208-209(rev.15)) to address this issue in affected HP-UX systems. Customers who are affected by this issue are advised to apply appropriate patches. Further information regarding obtaining and applying patches is available in the referenced advisory.
HP has released an updated advisory HPSBUX0208-209(rev.14) for HP-UX systems. Preliminary updates for HP-UX 11 and 11.11 are available. Further information on obtaining and applying fixes is available in the referenced HP advisory (HPSBUX0208-209).
A security fix was provided on October 1st, 2002 for Openwall GNU/*/Linux. Users should contact the vendor to obtain fixed glibc packages.
Conectiva has released an advisory (CLA-2002:535) which contains upgrades. See the referenced advisory for further details on obtaining fixes.
NetBSD 1.6 is not affected by this issue. Users are strongly urged to upgrade their systems to NetBSD 1.6 or to update to the most recent sources of the appropriate branches. Further details are available in the referenced NetBSD advisory.
Red Hat has released an advisory (RHSA-2002:197-09). Updated glibc and nscd RPMs are available. See the attached advisory for details on obtaining fixes.
FreeBSD has released an advisory. Users are advised to upgrade vulnerable systems to the 4.7-STABLE branch, or to the appropriate RELENG_4_x branch after the correction date. A patch is also available. Further details may be found in the referenced advisory.
HP has released advisory HPSBUX0208-209 (rev.13) to address this issue.
Mandrake has released an advisory MDKSA-2004:009 to address this issue. Please see the referenced advisory for more information.
HP has released advisory HPSBTL0211-075 for HP Secure OS advising users to apply the fixes listed in Red Hat advisory RHSA-2002:197-09.
Fixes are available:
Sun Cobalt RaQ XTR
-
Sun RaQXTR-All-Security-1.0.1-15578.pkg
http://ftp.cobalt.sun.com/pub/packages/raqxtr/eng/RaQXTR-All-Security-
1.0.1-15578.pkg
HP HP-UX 10.10
-
HP libc.1.1010
ftp://bind:bind1@hprc.external.hp.com/ -
HP libc.a.1010
ftp://bind:bind1@hprc.external.hp.com/ -
HP PHNE_27792.depot
ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 10.20
-
HP PHCO_26158
http://itrc.hp.com -
HP PHNE_27792.depot
ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 11.0
-
HP PHNE_27795
ftp://bind:bind1@hprc.external.hp.com/ -
HP PHNE_28449
ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 11.0 4
-
HP PHNE_27881
ftp://bind:bind1@hprc.external.hp.com/ -
HP PHNE_28415
ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 11.11
-
HP PHNE_27796
ftp://bind:bind1@hprc.external.hp.com/ -
HP PHNE_28450
ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 11.22
-
HP PHNE_27842.depot
ftp://bind:bind1@hprc.external.hp.com/ -
HP PHNE_28490
ftp://bind:bind1@hprc.external.hp.com/
GNU glibc 2.1.3
-
Conectiva glibc-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/glibc-2.1.3-26U60_4cl.i38
6.rpm -
Conectiva glibc-devel-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/glibc-devel-2.1.3-26U60_4
cl.i386.rpm -
Conectiva glibc-devel-static-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/glibc-devel-static-2.1.3-
26U60_4cl.i386.rpm -
Conectiva glibc-doc-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/glibc-doc-2.1.3-26U60_4cl
.i386.rpm -
Conectiva glibc-profile-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/glibc-profile-2.1.3-26U60
_4cl.i386.rpm -
Conectiva i18ndata-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/i18ndata-2.1.3-26U60_4cl.
i386.rpm -
Conectiva nscd-2.1.3-26U60_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/nscd-2.1.3-26U60_4cl.i386
.rpm -
Red Hat glibc-2.1.3-28.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-2.1.3-28.alpha.rpm -
Red Hat glibc-2.1.3-28.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-2.1.3-28.i386.rpm -
Red Hat glibc-2.1.3-28.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/glibc-2.1.3-28.sparc.rpm -
Red Hat glibc-2.1.3-28.sparcv9.rpm
ftp://updates.redhat.com/6.2/en/os/sparcv9/glibc-2.1.3-28.sparcv9.rpm -
Red Hat glibc-devel-2.1.3-28.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-devel-2.1.3-28.alpha.rp
m -
Red Hat glibc-devel-2.1.3-28.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-devel-2.1.3-28.i386.rpm -
Red Hat glibc-devel-2.1.3-28.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/glibc-devel-2.1.3-28.sparc.rp
m -
Red Hat glibc-profile-2.1.3-28.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-profile-2.1.3-28.alpha.
rpm -
Red Hat glibc-profile-2.1.3-28.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-profile-2.1.3-28.i386.rp
m -
Red Hat glibc-profile-2.1.3-28.sparc.rpm
参考网址
来源:US-CERT Vulnerability Note: VU#738331
名称: VU#738331
链接:http://www.kb.cert.org/vuls/id/738331来源: XF
名称: dns-resolver-lib-read-bo(10295)
链接:http://www.iss.net/security_center/static/10295.php来源: REDHAT
名称: RHSA-2003:212
链接:http://www.redhat.com/support/errata/RHSA-2003-212.html来源: REDHAT
名称: RHSA-2003:022
链接:http://www.redhat.com/support/errata/RHSA-2003-022.html来源: REDHAT
名称: RHSA-2002:258
链接:http://www.redhat.com/support/errata/RHSA-2002-258.html来源: REDHAT
名称: RHSA-2002:197
链接:http://www.redhat.com/support/errata/RHSA-2002-197.html来源: MANDRAKE
名称: MDKSA-2004:009
链接:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:009来源: CONECTIVA
名称: CLA-2002:535
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535来源: NETBSD
名称: NetBSD-SA2002-015
链接:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc