漏洞信息详情
mICQ远程拒绝服务攻击漏洞
- CNNVD编号:CNNVD-200212-043
- 危害等级: 中危
- CVE编号:
CVE-2002-1362
- 漏洞类型:
其他
- 发布时间:
2002-12-23
- 威胁类型:
远程
- 更新时间:
2005-05-13
- 厂 商:
matthew_smith - 漏洞来源:
Debian Security Ad… -
漏洞简介
mICQ是一款基于文本的ICQ客户端。
mICQ在接收到不包含所需的0xFE操作符的ICQ消息时会导致崩溃,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
目前没有更详细的漏洞细节。
漏洞公告
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-211-1)以及相应补丁:
DSA-211-1:New mICQ packages fix denial of service
链接:http://www.debian.org/security/2002/dsa-211” target=”_blank”>
http://www.debian.org/security/2002/dsa-211
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc
Size/MD5 checksum: 518 f0f0475b6485a2ea29d11f122e48c56f
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz
Size/MD5 checksum: 3700 66f4327ddf4f1e5985b79f5a941269ba
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz
Size/MD5 checksum: 100430 ddc011d3509d593284bf9336e0a9f829
Alpha architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb
Size/MD5 checksum: 110916 f6d7fae1df9522eac47d8d294c98544e
ARM architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb
Size/MD5 checksum: 45934 ec658e43960c448350e7790cef2a9551
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb
Size/MD5 checksum: 42682 1ed0c823d4ccc05bc9e2070c15a687be
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb
Size/MD5 checksum: 38426 5ed0e53eb1076a8e842f9e97f9b12f03
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb
Size/MD5 checksum: 59664 bb34cef3e0160a1d348a411cdf992185
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb
Size/MD5 checksum: 60374 77ff9ef07e621f35bff70a08fb738e6b
Debian GNU/Linux 3.0 alias woody
– ——————————–
Source archives:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc
Size/MD5 checksum: 568 a17ef67f61fa309172c1d4736b43cbb1
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz
Size/MD5 checksum: 3474 ca9382767417889409ce844e1b246e32
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz
Size/MD5 checksum: 419381 16a71fce3abba8d9f731fe7bd761b4b8
Alpha architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb
Size/MD5 checksum: 324512 80015dffaa7e80871568ef89356da8f1
ARM architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb
Size/MD5 checksum: 295992 e03eba7bcff456cbc59c60b56424363f
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb
Size/MD5 checksum: 289546 017ff4e61aa4a5041b2a5d55de3b1d2d
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb
Size/MD5 checksum: 342760 53729a3a8c7c3531e88524291b510765
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb
Size/MD5 checksum: 306116 769de74fac901a4e0de33b2522c50df6
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb
Size/MD5 checksum: 281462 6ea6464fd8a0829a803736c6eb00aab1
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb
Size/MD5 checksum: 299342 569fd2cb03a89770f1922645aba043e5
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb
Size/MD5 checksum: 299074 3a4103196d6b55accea6b87a4fa8cfd0
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb
Size/MD5 checksum: 293460 17973866bb09bf293834e180c9ca43b6
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb
Size/MD5 checksum: 290830 bf88418e50e0aab6ea8388597f1cd287
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb
Size/MD5 checksum: 295562 3c6defaa7748b4a43fee112e347e5195
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
参考网址
来源: DEBIAN
名称: DSA-211
链接:http://www.debian.org/security/2002/dsa-211
来源: XF
名称: micq-0xfe-dos(10872)
链接:http://xforce.iss.net/xforce/xfdb/10872
来源: BID
名称: 6392
链接:http://www.securityfocus.com/bid/6392
来源: REDHAT
名称: RHSA-2003:118
链接:http://www.redhat.com/support/errata/RHSA-2003-118.html