漏洞信息详情
Linux VServer Project可突破CHROOT环境漏洞
- CNNVD编号:CNNVD-200402-030
- 危害等级: 高危
![图片[1]-Linux VServer Project可突破CHROOT环境漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-17/bbdd3e8868c10d22861b2275d65f4500.png)
- CVE编号:
CVE-2004-2073
- 漏洞类型:
其他
- 发布时间:
2004-02-06
- 威胁类型:
本地
- 更新时间:
2005-10-20
- 厂 商:
vserver - 漏洞来源:
Markus Müller※ unk… -
漏洞简介
Linux-VServer是一个允许用户在一个普通的Linux服务器上建立虚拟专用的服务器的软件。
Linux-VServer存在典型的\”chroot-again\”问题,本地攻击者可以利用这个漏洞以ROOT用户权限在系统上执行任意指令。
主要问题是VServer应用程序针对\”chroot-again\”类型的攻击没有很好的进行安全保护,攻击者可以利用这个漏洞脱离限制环境,访问限制目录之外的任意文件。
漏洞公告
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-1011-1)以及相应补丁:
DSA-1011-1:New kernel-patch-vserver packages fix root exploit
链接:http://www.debian.org/security/2005/dsa-1011” target=”_blank”>
http://www.debian.org/security/2005/dsa-1011
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc
Size/MD5 checksum: 637 415731be72a9cd966e2fdb5d4f408c4a
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz
Size/MD5 checksum: 950447 fe6b34612095d2fbdbaab5aefbd83264
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc
Size/MD5 checksum: 752 e32069a5ca2ef2bc87794cd6c2160821
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz
Size/MD5 checksum: 115947 d0bb2cd998a73905189ee24b5f46dd0d
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz
Size/MD5 checksum: 677831 b315f375b1cef48da1b644dec18f22bd
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb
Size/MD5 checksum: 436934 b50048ea819d150d660ed96e3988613b
Alpha architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb
Size/MD5 checksum: 600660 e52fe0ff93e4c9ca7d58fe8386ebab5a
AMD64 architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb
Size/MD5 checksum: 429530 c4155982844c085b7d9bc59d7eaa02c4
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb
Size/MD5 checksum: 398794 56831faa6fa6d76c601fee78251f50eb
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb
Size/MD5 checksum: 640332 ab2b2e4283ca5b62c9d9cf5776b6dadb
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb
Size/MD5 checksum: 612918 e4a60532f25ce776880261de79278e85
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mipsel.deb
Size/MD5 checksum: 614152 f3aee29aad2682878f8ed22064f3fafa
PowerPC architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_powerpc.deb
Size/MD5 checksum: 425444 9a7542249c2b70661abab2afd5270462
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_s390.deb
Size/MD5 checksum: 440880 376560971a0d2db4bfd51beb67d42bff
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_sparc.deb
Size/MD5 checksum: 395640 51e24ac4754b1aa41277378ee9271a1f
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
VServer
——-
http://www.debian.org/security/2006/dsa-1011” target=”_blank”>
http://www.debian.org/security/2006/dsa-1011
参考网址
来源: www.linux-vserver.org
链接:http://www.linux-vserver.org/index.php?page=ChangeLog
来源: XF
名称: linux-vserver-gain-privileges(15073)
链接:http://xforce.iss.net/xforce/xfdb/15073
来源: BID
名称: 9596
链接:http://www.securityfocus.com/bid/9596
来源: BUGTRAQ
名称: 20040206 Linux 2.4.24 with vserver 1.24 exploit
链接:http://www.securityfocus.com/archive/1/353003
来源: OSVDB
名称: 3875
链接:http://www.osvdb.org/3875
来源: SECUNIA
名称: 10816
链接:http://secunia.com/advisories/10816






















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)