openoffice osc任意命令执行漏洞

漏洞信息详情

openoffice osc任意命令执行漏洞

漏洞简介

Novell osc(OpenSUSE commander)是美国Novell公司的一款基于Python语言的用于openSUSE Build Service(OBS,开放的完整的发行版开发平台)中的命令行客户端,它主要用于显示编译的日志和编译的状态。

osc 0.133及之前的版本中存在安全漏洞。远程攻击者可通过创建包含转义序列的build log或build status利用该漏洞执行任意命令。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html

参考网址

来源: bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=798353

来源: bugzilla.novell.com

链接:https://bugzilla.novell.com/show_bug.cgi?id=749335

来源: MLIST

名称: [oss-security] 20120301 Re: Re: CVE Request (minor) — osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status

链接:http://www.openwall.com/lists/oss-security/2012/03/02/2

来源: MLIST

名称: [oss-security] 20120228 CVE Request (minor) — osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status

链接:http://www.openwall.com/lists/oss-security/2012/02/28/9

来源: MLIST

名称: [oss-security] 20120228 Re: CVE Request (minor) — osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status

链接:http://www.openwall.com/lists/oss-security/2012/02/28/15

来源: SUSE

名称: openSUSE-SU-2012:0400

链接:http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html

来源:SECUNIA

名称:48494

链接:http://secunia.com/advisories/48494

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享