Neon WebDAV客户端库缓冲区错误漏洞

漏洞信息详情

Neon WebDAV客户端库缓冲区错误漏洞

漏洞简介

neon是一个带有C接口的HTTP/1.1和WebDAV客户端库。

neon是一款HTTP和WebDAV客户端库。Neon WebDAV客户端库不正确检查用户提供的数据,远程攻击者可以利用这个漏洞对调用库的应用程序进行基于堆的溢出。问题存在于ne_rfc1036_parse()函数中,提交特殊的日期字符串给ne_rfc1036_parse()可触发sscanf()字符串溢出堆中的静态变量,成功利用此漏洞可能以调用此库的应用程序进程权限执行任意指令。

漏洞公告

厂商补丁:

Debian

——


http://www.debian.org/security/2004/dsa-507” target=”_blank”>


http://www.debian.org/security/2004/dsa-507

MandrakeSoft

————

MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:049)以及相应补丁:

MDKSA-2004:049:Updated libneon packages fix heap variable overflow issues

链接:
http://www.linux-mandrake.com/en/security/2004/2004-049.php” target=”_blank”>


http://www.linux-mandrake.com/en/security/2004/2004-049.php

补丁下载:

Updated Packages:

Mandrakelinux 10.0:

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-0.24.5-0.2.100mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-devel-0.24.5-0.2.100mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/libneon0.24-static-devel-0.24.5-0.2.100mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/SRPMS/libneon-0.24.5-0.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-0.24.5-0.2.100mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-devel-0.24.5-0.2.100mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/RPMS/lib64neon0.24-static-devel-0.24.5-0.2.100mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/10.0/SRPMS/libneon-0.24.5-0.2.100mdk.src.rpm

Mandrakelinux 9.2:

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-0.24.5-0.2.92mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-devel-0.24.5-0.2.92mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/libneon0.24-static-devel-0.24.5-0.2.92mdk.i586.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/SRPMS/libneon-0.24.5-0.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-0.24.5-0.2.92mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-devel-0.24.5-0.2.92mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/RPMS/lib64neon0.24-static-devel-0.24.5-0.2.92mdk.amd64.rpm

ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/amd64/9.2/SRPMS/libneon-0.24.5-0.2.92mdk.src.rpm

_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:


http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>


http://www.mandrakesecure.net/en/ftp.php

上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:


http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>


http://www.mandrakesecure.net/en/ftp.php

Neon

—-

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Neon Upgrade neon-0.24.6.tar.gz


http://www.webdav.org/neon/neon-0.24.6.tar.gz” target=”_blank”>


http://www.webdav.org/neon/neon-0.24.6.tar.gz

参考网址

来源:http://nvd.nist.gov/nvd.cfm?cvename=CVE-2004-0398※http://www.securityfocus.com/bid/10385※http://www.nsfocus.net/vulndb/6484

链接:无

来源:CIAC

链接:http://www.ciac.org/ciac/bulletins/o-148.shtml

来源:BUGTRAQ

链接:http://marc.info/?l=bugtraq&m=108500057108022&w=2

来源:GENTOO

链接:http://security.gentoo.org/glsa/glsa-200405-13.xml

来源:BUGTRAQ

链接:http://marc.info/?l=bugtraq&m=108498433632333&w=2

来源:GENTOO

链接:http://security.gentoo.org/glsa/glsa-200405-15.xml

来源:CONECTIVA

链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841

来源:SECUNIA

链接:http://secunia.com/advisories/11673

来源:DEBIAN

链接:https://www.debian.org/security/2004/dsa-507

来源:FEDORA

链接:https://bugzilla.fedora.us/show_bug.cgi?id=1552

来源:SECUNIA

链接:http://secunia.com/advisories/11650

来源:DEBIAN

链接:https://www.debian.org/security/2004/dsa-506

来源:FULLDISC

链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html

来源:BID

链接:https://www.securityfocus.com/bid/10385

来源:OSVDB

链接:http://www.osvdb.org/6302

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/16192

来源:SECUNIA

链接:http://secunia.com/advisories/11638

来源:MANDRAKE

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2004:049

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2004-191.html

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享