漏洞信息详情
Pine Unix用户名账户信息泄漏漏洞
- CNNVD编号:CNNVD-200212-607
- 危害等级: 中危
- CVE编号:
CVE-2002-1903
- 漏洞类型:
设计错误
- 发布时间:
2002-12-31
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
university_of_washington - 漏洞来源:
Vulnerability disc… -
漏洞简介
Pine 4.2.1至4.4.4版本将Unix用户名and/or uid放入Sender: 和 X-Sender:头。远程攻击者可以利用该漏洞获得敏感信息。
漏洞公告
An untested patch has been made available by Roger Marquis
——————————————————————–
— pine/send.c.orig Tue Jan 8 12:59:37 2002
+++ pine/send.c Sat Mar 9 09:17:08 2002
@@ -3989,12 +3989,15 @@
outgoing->return_path = rfc822_cpy_adr(outgoing->from);
+
/*
* Don’t ever believe the sender that is there.
* If From doesn’t look quite right, generate our own sender.
*/
+ /**** fix u-washington anti-privacy loophole
if(outgoing->sender)
mail_free_address(&outgoing->sender);
+ /****
/*
* If the LHS of the address doesn’t match, or the RHS
@@ -4003,6 +4006,7 @@
*
* Don’t add a personal_name since the user can change that.
*/
+ /**** fix u-washington anti-privacy loophole
if(!outgoing->from
|| !outgoing->from->mailbox
|| strucmp(outgoing->from->mailbox, ps_global->VAR_USER_ID) != 0
@@ -4014,6 +4018,7 @@
outgoing->sender->mailbox = cpystr(ps_global->VAR_USER_ID);
outgoing->sender->host = cpystr(ps_global->hostname);
}
+ /****
/*—– Message is edited, now decide what to do with it —-*/
if(editor_result & (COMP_SUSPEND | COMP_GOTHUP | COMP_CANCEL)){
——————————————————————–
参考网址
来源: BID
名称: 4963
链接:http://www.securityfocus.com/bid/4963
来源: XF
名称: pine-username-disclosure(9297)
链接:http://www.iss.net/security_center/static/9297.php