Man程序不安全返回值命令执行漏洞

漏洞信息详情

Man程序不安全返回值命令执行漏洞

漏洞简介

Man 1.5l之前的版本存在漏洞。远程攻击者可以借助一个带有不正确引用的畸形man文件执行任意代码,该漏洞可以导致my_xsprintf函数返回一个带有“unsafe”值的字符串,然后借助系统调用像程序一样执行,该系统调用在运行man的用户搜索路径上。

漏洞公告

Sorcerer Linux has released an advisory. Users are advised to update man sources by issuing the following commands:
augur synch && augur update
It is recommended that all Gentoo Linux users who are running
sys-apps/man upgrade to man-1.5l as follows:
emerge sync
emerge man
emerge clean
Mandrake has released a security advisory (MDKSA-2003:054) containing fixes to address this issue. Users are advised to apply fixes as soon as possible.
Sun has released an update for Sun Linux 5.0.5.
Fixes available:
Andries Brouwer man 1.5 k

Andries Brouwer man 1.5 i

Andries Brouwer man 1.5 i2

Andries Brouwer man 1.5 j

Andries Brouwer man 1.5 h1

参考网址

来源: BID
名称: 7066
链接:http://www.securityfocus.com/bid/7066

来源: BUGTRAQ
名称: 20030311 Vulnerability in man < 1.5l
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104740927915154&w=2

来源: XF
名称: man-myxsprintf-code-execution(11512)
链接:http://xforce.iss.net/xforce/xfdb/11512

来源: REDHAT
名称: RHSA-2003:134
链接:http://www.redhat.com/support/errata/RHSA-2003-134.html

来源: REDHAT
名称: RHSA-2003:133
链接:http://www.redhat.com/support/errata/RHSA-2003-133.html

来源: GENTOO
名称: GLSA-200303-13
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104802285112752&w=2

来源: CONECTIVA
名称: CLSA-2003:620
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000620

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享