漏洞信息详情
Ethereal BGP解析器无限循环远程拒绝服务攻击漏洞
- CNNVD编号:CNNVD-200212-044
- 危害等级: 中危
- CVE编号:
CVE-2002-1355
- 漏洞类型:
设计错误
- 发布时间:
2002-12-23
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
ethereal_group - 漏洞来源:
Ethereal -
漏洞简介
Ethereal是一款免费开放源代码的网络协议分析程序,可使用在Unix和Windows操作系统下。
Ethereal中的BGP解析器在消息长度为负值时处理不正确,远程攻击者利用这个漏洞进行发送恶意包使Ethereal崩溃,导致拒绝服务攻击。
Ethereal中的BGP解析器用于对边界网关协议(BGP)进行解码。由于对消息包长度负正处理不匹配,攻击者可以构建包含长度为负值的的BGP消息包并提交给有Ethereal监听的网络中,可导致Ethereal崩溃。
漏洞公告
厂商补丁:
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2002:290-07)以及相应补丁:
RHSA-2002:290-07:Updated Ethereal packages are available
链接:https://www.redhat.com/support/errata/RHSA-2002-290.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2002-290.html
补丁下载:
Red Hat Upgrade ethereal-0.9.8-0.72.0.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-0.9.8-0.72.0.i386.rpm
Red Hat Upgrade ethereal-gnome-0.9.8-0.72.0.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-gnome-0.9.8-0.72.0.i386.rpm
Red Hat Upgrade ethereal-0.9.8-0.72.0.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-0.9.8-0.72.0.ia64.rpm
Red Hat Upgrade ethereal-gnome-0.9.8-0.72.0.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-gnome-0.9.8-0.72.0.ia64.rpm
Red Hat Upgrade ethereal-0.9.8-0.73.0.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-0.9.8-0.73.0.i386.rpm
Red Hat Upgrade ethereal-gnome-0.9.8-0.73.0.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-gnome-0.9.8-0.73.0.i386.rpm
Red Hat Upgrade ethereal-0.9.8-0.80.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-0.9.8-0.80.0.i386.rpm
Red Hat Upgrade ethereal-gnome-0.9.8-0.80.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-gnome-0.9.8-0.80.0.i386.rpm
Ethereal Group
————–
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Ethereal Group Upgrade Ethereal 0.9.8
http://www.ethereal.com/download.html” target=”_blank”>
http://www.ethereal.com/download.html
参考网址
来源: REDHAT
名称: RHSA-2002:290
链接:http://www.redhat.com/support/errata/RHSA-2002-290.html
来源: www.ethereal.com
链接:http://www.ethereal.com/appnotes/enpa-sa-00007.html
来源: www.ethereal.com
链接:http://www.ethereal.com/cgi-bin/viewcvs.cgi/ethereal/packet-bgp.c.diff?r1=1.68&r2=1.69