WWW-SQL Include命令远程缓冲区溢出漏洞

漏洞信息详情

WWW-SQL Include命令远程缓冲区溢出漏洞

漏洞简介

www-sql是一款能在HTML嵌入SQL语句,生成动态WEB页的工具。
www-sql包含的include命令实现存在缓冲区溢出,远程攻击者可以利用这个漏洞可能以进程权限在系统上执行任意指令。
主要问题存在于对用户提供的字符串,拷贝到堆栈缓冲区时缺少充分缓冲区边界检查,精心构建提交数据可能以进程权限在系统上执行任意指令。

漏洞公告

厂商补丁:
Debian
——
Debian系统补丁下载:

Debian GNU/Linux 3.0 alias woody

– ——————————–

Source archives:

http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc

Size/MD5 checksum: 623 830be25aad38186b4178ce5ff424d796

http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz

Size/MD5 checksum: 5651 17f259d168cb7d620c125d5d7cc3a311

http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz

Size/MD5 checksum: 144332 96aaae705c711c4af723c6646a48c301

Alpha architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb

Size/MD5 checksum: 47508 453ee924cde1a11376a4502995670e8e

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb

Size/MD5 checksum: 48472 e1652f6b7d2454a7e1288874821a09e1

ARM architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb

Size/MD5 checksum: 42002 4254ca5e05d673c1d73c4f9ed73ed126

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb

Size/MD5 checksum: 42338 404e674c59182c200b9693d80289b752

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb

Size/MD5 checksum: 41446 28de214d36809a8ed88484d65a290619

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb

Size/MD5 checksum: 41798 3cdd4a39f99a88b4ee868c7be8e051fc

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb

Size/MD5 checksum: 53050 8d8caceeb1843afef110dba1f94f91bb

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb

Size/MD5 checksum: 53524 b5e42ce7363e4617fe88a05fc1dd048e

HP Precision architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb

Size/MD5 checksum: 45330 a0da3671f82ebd5c4dac0ff894463021

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb

Size/MD5 checksum: 45796 6729114cc8e92fa1b278ccf619370f50

Motorola 680×0 architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb

Size/MD5 checksum: 40222 0af8912f6629243e49f71b520c9522c1

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb

Size/MD5 checksum: 40542 edb269316ec27e7f73bb801e0bb74c00

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb

Size/MD5 checksum: 45190 eba2210f7bbfb019d7a4dacb40e69460

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb

Size/MD5 checksum: 45438 ee92959d93a961dcd431a7b917677aef

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb

Size/MD5 checksum: 45154 409d7105da9c8ad1f6058d5ac9afa3e1

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb

Size/MD5 checksum: 45396 3c546d9fb0bd4a8e9d7cf49170548025

PowerPC architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb

Size/MD5 checksum: 43308 c28b6434bd49223dad7d0b66dfcadc2b

http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb

Size/MD5 checksum: 43590 99ac9c623aeca76c3ff11c5396dc0cd6

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb

S

参考网址

来源: XF
名称: wwwsql-cgi-command-execution(16455)
链接:http://xforce.iss.net/xforce/xfdb/16455

来源: BID
名称: 10577
链接:http://www.securityfocus.com/bid/10577

来源: DEBIAN
名称: DSA-523
链接:http://www.debian.org/security/2004/dsa-523

受影响实体

    暂无

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享