Pine rfc2231_get_param()远程整数溢出漏洞

漏洞信息详情

Pine rfc2231_get_param()远程整数溢出漏洞

漏洞简介

Pine是一款开放源代码的EMAIL客户端。
Pine包含的rfc2231_get_param()函数存在整数溢出问题,远程攻击者可以利用这个漏洞构建恶意邮件,诱使用户访问,以用户进程权限在系统上执行任意指令。
问题存在于strings.c文件中的rfc2231_get_param()函数,其中声明了64字节大小的字符数组:
#define RFC2231_MAX 64

char *pieces[RFC2231_MAX];
and indexed by the signed integer variable \’\’n\’\’:
if(n < RFC2231_MAX){
pieces[n] = parms->value;
变量\’\’n\’\’可由攻击者控制,并且可以设置成负值绕过安全检查,通过存储汇编代码在parms->value结构中并覆盖64字节数组,就可能覆盖堆栈中的指令指针,以用户权限在系统上执行任意指令。

漏洞公告

厂商补丁:
Conectiva
———
Conectiva已经为此发布了一个安全公告(CLA-2003:738)以及相应补丁:

CLA-2003:738:pine

链接:http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000738” target=”_blank”>
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000738

补丁下载:

ftp://atualizacoes.conectiva.com.br/7.0/RPMS/pine-4.50L-1U70_2cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/pine-4.50L-1U70_2cl.src.rpm

ftp://atualizacoes.conectiva.com.br/8/RPMS/pine-4.50L-1U80_2cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/8/SRPMS/pine-4.50L-1U80_2cl.src.rpm

ftp://atualizacoes.conectiva.com.br/9/RPMS/pine-4.53L-22751U90_1cl.i386.rpm

ftp://atualizacoes.conectiva.com.br/9/SRPMS/pine-4.53L-22751U90_1cl.src.rpm
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2003:273-01)以及相应补丁:

RHSA-2003:273-01:Updated pine packages fix vulnerabilities

链接:https://www.redhat.com/support/errata/RHSA-2003-273.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2003-273.html

补丁下载:

Red Hat Linux 7.1:

SRPMS:

ftp://updates.redhat.com/7.1/en/os/SRPMS/pine-4.44-19.71.0.src.rpm

i386:

ftp://updates.redhat.com/7.1/en/os/i386/pine-4.44-19.71.0.i386.rpm

Red Hat Linux 7.2:

SRPMS:

ftp://updates.redhat.com/7.2/en/os/SRPMS/pine-4.44-19.72.0.src.rpm

i386:

ftp://updates.redhat.com/7.2/en/os/i386/pine-4.44-19.72.0.i386.rpm

ia64:

ftp://updates.redhat.com/7.2/en/os/ia64/pine-4.44-19.72.0.ia64.rpm

Red Hat Linux 7.3:

SRPMS:

ftp://updates.redhat.com/7.3/en/os/SRPMS/pine-4.44-19.73.0.src.rpm

i386:

ftp://updates.redhat.com/7.3/en/os/i386/pine-4.44-19.73.0.i386.rpm

Red Hat Linux 8.0:

SRPMS:

ftp://updates.redhat.com/8.0/en/os/SRPMS/pine-4.44-19.80.0.src.rpm

i386:

ftp://updates.redhat.com/8.0/en/os/i386/pine-4.44-19.80.0.i386.rpm

Red Hat Linux 9:

SRPMS:

ftp://updates.redhat.com/9/en/os/SRPMS/pine-4.44-19.90.0.src.rpm

i386:

ftp://updates.redhat.com/9/en/os/i386/pine-4.44-19.90.0.i386.rpm
S.u.S.E.
——–
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2003:037)以及相应补丁:

SuSE-SA:2003:037:pine

链接:

补丁下载:

Intel i386 Platform:

SuSE-8.2:

ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/pine-4.53-109.i586.rpm

c3d94808af56ac9fcc77bec85733bc47

patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/pine-4.53-109.i586.patch.rpm

fff680da5c283d2d50a44419976881a8

source rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/pine-4.53-109.src.rpm

327935d468b4cd7794dde00168a901c3

SuSE-8.1:

ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-283.i586.rpm

63bc3f723537b18a274404c9b30ea784

patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-283.i586.patch.rpm

1d4711753488a274c8cf168b24c91acf

source rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/pine-4.44-283.src.rpm

9617c79c854c2b800df476aa515ae351

SuSE-8.0:

ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-281.i386.rpm

edea9fbbf85a9f922d2b2aa8bf4a14e8

patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-281.i386.patch.rpm

18c95a919fb8767f3cff10218ce6c08c

source rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/pine-4.44-281.src.rpm

6bf6b39feed23892faceaa78fd13b751

SuSE-7.3:

ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/pine-4.33-280.i386.rpm

65d24983aa99d276e75ccd557eee557b

source rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/pine-4.33-280.src.rpm

b0ecee1170d1fdec3b22e98d0941071a

SuSE-7.2:

ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/pine-4.33-279.i386.rpm

574ae6efcf81a53a26d5d19b763f96ab

source rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/pine-4.33-279.src.rpm

14fbade46db5dbc9c9893cf507d57e4a

Sparc Platform:

SuSE-7.3:

ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n1/pine-4.33-101.sparc.rpm

4e90502bfc4ca5b49c20f8a10cb9d473

s

参考网址

来源: REDHAT
名称: RHSA-2003:273
链接:http://www.redhat.com/support/errata/RHSA-2003-273.html

来源: IDEFENSE
名称: 20030910 Two Exploitable Overflows in PINE
链接:http://www.idefense.com/advisory/09.10.03.txt

来源: REDHAT
名称: RHSA-2003:274
链接:http://www.redhat.com/support/errata/RHSA-2003-274.html

来源: FULLDISC
名称: 20030911 Pine: .procmailrc rule against integer overflow
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009850.html

来源: BUGTRAQ
名称: 20030915 remote Pine <= 4.56 exploit fully automatic
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106367213400313&w=2

来源: BUGTRAQ
名称: 20030911 [slackware-security] security issues in pine (SSA:2003-253-01)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106329356702508&w=2

来源: US Government Resource: oval:org.mitre.oval:def:503
名称: oval:org.mitre.oval:def:503
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:503

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享