Dia多个远程格式串处理漏洞

2008-04-09 04:14:49来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

Dia多个远程格式串处理漏洞

发布日期:2006-05-30
更新日期:2006-06-07

受影响系统:
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Linux Mandrake 2006.0 x86_64
MandrakeSoft Linux Mandrake 2006.0
Ubuntu Linux 5.10 powerpc
Ubuntu Linux 5.10 i386
Ubuntu Linux 5.10 amd64
Ubuntu Linux 5.0 4 powerpc
Ubuntu Linux 5.0 4 i386
Ubuntu Linux 5.0 4 amd64
Dia Dia 0.95-pre6
Dia Dia 0.95
Dia Dia 0.94
Dia Dia 0.93
Dia Dia 0.92.2
Dia Dia 0.91
Dia Dia 0.88.1
Dia Dia 0.87
描述:
BUGTRAQ ID: 18166
CVE(CAN) ID: CVE-2006-2453

Dia是基于gtk 的图表创建工具。

Dia的实现存在几个格式串处理漏洞,攻击者可能利用此漏洞诱使用户打开恶意文件在用户机器上执行任意指令。

攻击者可以诱骗用户打开恶意的dia文件或有特殊名称的文件,导致以当前用户权限执行任意指令。

<*来源:Hans de Goede

链接:http://secunia.com/advisories/20254/print/
http://www.ubuntu.com/usn/usn-286-1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192830
http://security.gentoo.org/glsa/glsa-200606-03.xml
http://lwn.net/Alerts/186061
*>

建议:
厂商补丁:

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2006:0541-02)以及相应补丁:
RHSA-2006:0541-02:Moderate: dia security update
链接:http://lwn.net/Alerts/186061

补丁下载:
Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/dia-0.94-5.7.1.src.rpm
d55df9a68f2c56a994dd8f71aee11380 dia-0.94-5.7.1.src.rpm

i386:
bc2e13813b8131cd8ea6dcdab910ed15 dia-0.94-5.7.1.i386.rpm
f0cfd596249745cce1dc26854fa2d785 dia-debuginfo-0.94-5.7.1.i386.rpm

ia64:
46e39c3112958e964d3aee06c5ec0562 dia-0.94-5.7.1.ia64.rpm
32a07c762ff0f4e2b35176c9b851d33c dia-debuginfo-0.94-5.7.1.ia64.rpm

ppc:
c468d0fda6ef02ef7ed3706701b5ef80 dia-0.94-5.7.1.ppc.rpm
6e913ed7eb05ff1764178822ab0ea249 dia-debuginfo-0.94-5.7.1.ppc.rpm

s390:
fb8026ab24b596855a59552f78efcc44 dia-0.94-5.7.1.s390.rpm
4159c13dca73903490b98499c5c60eb2 dia-debuginfo-0.94-5.7.1.s390.rpm

s390x:
aa3cd319dac56c3b8f423cda410eef53 dia-0.94-5.7.1.s390x.rpm
579389e8483e1b94e381c2801e17d752 dia-debuginfo-0.94-5.7.1.s390x.rpm

x86_64:
8f0f6342f2c3fcb6cbd07ff8a0887ac8 dia-0.94-5.7.1.x86_64.rpm
851110084403997d62847d332f07b110 dia-debuginfo-0.94-5.7.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/dia-0.94-5.7.1.src.rpm
d55df9a68f2c56a994dd8f71aee11380 dia-0.94-5.7.1.src.rpm

i386:
bc2e13813b8131cd8ea6dcdab910ed15 dia-0.94-5.7.1.i386.rpm
f0cfd596249745cce1dc26854fa2d785 dia-debuginfo-0.94-5.7.1.i386.rpm

x86_64:
8f0f6342f2c3fcb6cbd07ff8a0887ac8 dia-0.94-5.7.1.x86_64.rpm
851110084403997d62847d332f07b110 dia-debuginfo-0.94-5.7.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/dia-0.94-5.7.1.src.rpm
d55df9a68f2c56a994dd8f71aee11380 dia-0.94-5.7.1.src.rpm

i386:
bc2e13813b8131cd8ea6dcdab910ed15 dia-0.94-5.7.1.i386.rpm
f0cfd596249745cce1dc26854fa2d785 dia-debuginfo-0.94-5.7.1.i386.rpm

ia64:
46e39c3112958e964d3aee06c5ec0562 dia-0.94-5.7.1.ia64.rpm
32a07c762ff0f4e2b35176c9b851d33c dia-debuginfo-0.94-5.7.1.ia64.rpm

x86_64:
8f0f6342f2c3fcb6cbd07ff8a0887ac8 dia-0.94-5.7.1.x86_64.rpm
851110084403997d62847d332f07b110 dia-debuginfo-0.94-5.7.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/dia-0.94-5.7.1.src.rpm
d55df9a68f2c56a994dd8f71aee11380 dia-0.94-5.7.1.src.rpm

i386:
bc2e13813b8131cd8ea6dcdab910ed15 dia-0.94-5.7.1.i386.rpm
f0cfd596249745cce1dc26854fa2d785 dia-debuginfo-0.94-5.7.1.i386.rpm

ia64:
46e39c3112958e964d3aee06c5ec0562 dia-0.94-5.7.1.ia64.rpm
32a07c762ff0f4e2b35176c9b851d33c dia-debuginfo-0.94-5.7.1.ia64.rpm

x86_64:
8f0f6342f2c3fcb6cbd07ff8a0887ac8 dia-0.94-5.7.1.x86_64.rpm
851110084403997d62847d332f07b110 dia-debuginfo-0.94-5.7.1.x86_64.rpm

可使用下列命令安装补丁:

rpm -Fvh [文件名]

Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200606-03)以及相应补丁:
GLSA-200606-03:Dia: Format string vulnerabilities
链接:http://security.gentoo.org/glsa/glsa-200606-03.xml

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:Tor隐藏服务泄漏漏洞

下一篇:WhitSoft Development SlimFTPd远程拒绝服务漏洞