mICQ远程拒绝服务攻击漏洞

漏洞信息详情

mICQ远程拒绝服务攻击漏洞

漏洞简介

mICQ是一款基于文本的ICQ客户端。
mICQ在接收到不包含所需的0xFE操作符的ICQ消息时会导致崩溃,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
目前没有更详细的漏洞细节。

漏洞公告

厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-211-1)以及相应补丁:

DSA-211-1:New mICQ packages fix denial of service

链接:http://www.debian.org/security/2002/dsa-211” target=”_blank”>
http://www.debian.org/security/2002/dsa-211

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc

Size/MD5 checksum: 518 f0f0475b6485a2ea29d11f122e48c56f

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz

Size/MD5 checksum: 3700 66f4327ddf4f1e5985b79f5a941269ba

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz

Size/MD5 checksum: 100430 ddc011d3509d593284bf9336e0a9f829

Alpha architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb

Size/MD5 checksum: 110916 f6d7fae1df9522eac47d8d294c98544e

ARM architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb

Size/MD5 checksum: 45934 ec658e43960c448350e7790cef2a9551

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb

Size/MD5 checksum: 42682 1ed0c823d4ccc05bc9e2070c15a687be

Motorola 680×0 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb

Size/MD5 checksum: 38426 5ed0e53eb1076a8e842f9e97f9b12f03

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb

Size/MD5 checksum: 59664 bb34cef3e0160a1d348a411cdf992185

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb

Size/MD5 checksum: 60374 77ff9ef07e621f35bff70a08fb738e6b

Debian GNU/Linux 3.0 alias woody

– ——————————–

Source archives:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc

Size/MD5 checksum: 568 a17ef67f61fa309172c1d4736b43cbb1

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz

Size/MD5 checksum: 3474 ca9382767417889409ce844e1b246e32

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz

Size/MD5 checksum: 419381 16a71fce3abba8d9f731fe7bd761b4b8

Alpha architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb

Size/MD5 checksum: 324512 80015dffaa7e80871568ef89356da8f1

ARM architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb

Size/MD5 checksum: 295992 e03eba7bcff456cbc59c60b56424363f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb

Size/MD5 checksum: 289546 017ff4e61aa4a5041b2a5d55de3b1d2d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb

Size/MD5 checksum: 342760 53729a3a8c7c3531e88524291b510765

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb

Size/MD5 checksum: 306116 769de74fac901a4e0de33b2522c50df6

Motorola 680×0 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb

Size/MD5 checksum: 281462 6ea6464fd8a0829a803736c6eb00aab1

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb

Size/MD5 checksum: 299342 569fd2cb03a89770f1922645aba043e5

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb

Size/MD5 checksum: 299074 3a4103196d6b55accea6b87a4fa8cfd0

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb

Size/MD5 checksum: 293460 17973866bb09bf293834e180c9ca43b6

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb

Size/MD5 checksum: 290830 bf88418e50e0aab6ea8388597f1cd287

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb

Size/MD5 checksum: 295562 3c6defaa7748b4a43fee112e347e5195

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade

参考网址

来源: DEBIAN
名称: DSA-211
链接:http://www.debian.org/security/2002/dsa-211

来源: XF
名称: micq-0xfe-dos(10872)
链接:http://xforce.iss.net/xforce/xfdb/10872

来源: BID
名称: 6392
链接:http://www.securityfocus.com/bid/6392

来源: REDHAT
名称: RHSA-2003:118
链接:http://www.redhat.com/support/errata/RHSA-2003-118.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享