LibXpm图象解码多个缓冲区溢出漏洞

2008-04-09 04:19:45来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

LibXpm图象解码多个缓冲区溢出漏洞

发布日期:2004-09-17
更新日期:2004-09-23

受影响系统:
OpenBSD OpenBSD 3.5
OpenBSD OpenBSD 3.4
XFree86 X11R6 4.2.1
XFree86 X11R6 4.2.0
XFree86 X11R6 4.1.0
XFree86 X11R6 4.1-12
XFree86 X11R6 4.1-11
XFree86 X11R6 4.0.3
XFree86 X11R6 4.0.2-11
XFree86 X11R6 4.0.1
XFree86 X11R6 4.0
XFree86 X11R6 3.3.6
X.org X11R6 6.8
X.org X11R6 6.7.0
XFree86 X11R6 4.3
- Mandrake Linux 9.2
- Mandrake Linux 9.1
- RedHat Fedora Core1
- RedHat Linux 9.0
- Slackware Linux 9.1
- Slackware Linux 9.0
不受影响系统:
X.org X11R6 6.8.1
描述:
BUGTRAQ ID: 11196
CVE(CAN) ID: CVE-2004-0687,CVE-2004-0688

libXpm是一款对XPM进行解码的库系统。

libXpm多处不正确检查边界缓冲区长度,远程攻击者可以利用这个漏洞可能以用户进程权限执行任意指令。

问题一是xpmParseColors (parse.c)中的堆栈缓冲区溢出:

XPMv1和XPMv2/3解析代码中不安全使用strcat(),可导致缓冲区溢出。

第二个问题是xpmParseColors (parse.c)中分配colorTable存在整数溢出问题,问题存在于如下:

colorTable = (XpmColor *) XpmCalloc(ncolors, sizeof(XpmColor));

ncolors可来自不可信的XPM文件。

第三个问题是ParseAndPutPixels (create.c)读取象素时存在堆栈缓冲区溢出。

构建恶意的XPM文件,诱使用户访问可导致以用户进程权限执行任意指令。

<*来源:chris (chris@cr-secure.net)

链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109530851323415&w=2
http://www.debian.org/security/2002/dsa-548
http://www.linux-mandrake.com/en/security/2004/2004-099.php
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-548-1)以及相应补丁:
DSA-548-1:New imlib packages fix arbitrary code execution
链接:http://www.debian.org/security/2002/dsa-548

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/i/imlib/imlib_1.9.14-2wody1.dsc
Size/MD5 checksum: 803 6472ca2afec2286f184350d849bf9a5d
http://security.debian.org/pool/updates/main/i/imlib/imlib_1.9.14-2wody1.diff.gz
Size/MD5 checksum: 269552 31472b9a33f689d518c237fa7d742961
http://security.debian.org/pool/updates/main/i/imlib/imlib_1.9.14.orig.tar.gz
Size/MD5 checksum: 748591 1fa54011e4e1db532d7eadae3ced6a8c

Architecture independent components:

http://security.debian.org/pool/updates/main/i/imlib/imlib-base_1.9.14-2wody1_all.deb
Size/MD5 checksum: 114576 15b012593229931c4bbc29040d2fdae5

Alpha architecture:

http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib-dev_1.9.14-2wody1_alpha.deb
Size/MD5 checksum: 119104 4e64b397ae2e9a839600fc8f19fdd1df
http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib1_1.9.14-2wody1_alpha.deb
Size/MD5 checksum: 96582 a0f07e9f4ded557eb3fabc0914ea6625
http://security.debian.org/pool/updates/main/i/imlib/imlib-dev_1.9.14-2wody1_alpha.deb
Size/MD5 checksum: 116752 d036103895155f0267a26283631978d5
http://security.debian.org/pool/updates/main/i/imlib/imlib-progs_1.9.14-2wody1_alpha.deb
Size/MD5 checksum: 262078 5e49dc13a1a4d61f74222dc1ae1bcb57
http://security.debian.org/pool/updates/main/i/imlib/imlib1_1.9.14-2wody1_alpha.deb
Size/MD5 checksum: 96668 b4cff88f951f6682358f6f393691a5bd

ARM architecture:

http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib-dev_1.9.14-2wody1_arm.deb
Size/MD5 checksum: 93592 9c928508c6366fa367cddaecf4d2e99d
http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib1_1.9.14-2wody1_arm.deb
Size/MD5 checksum: 75032 4f90fccb7d8bc12b188d62da43f8f712
http://security.debian.org/pool/updates/main/i/imlib/imlib-dev_1.9.14-2wody1_arm.deb
Size/MD5 checksum: 93634 1c44359a8043ecd94dbcd7a4349fac6a
http://security.debian.org/pool/updates/main/i/imlib/imlib-progs_1.9.14-2wody1_arm.deb
Size/MD5 checksum: 258134 5f10db2bcb55a1ef8de534bdd0be730a
http://security.debian.org/pool/updates/main/i/imlib/imlib1_1.9.14-2wody1_arm.deb
Size/MD5 checksum: 75924 87ff486de47e594a996992a8721c9542

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib-dev_1.9.14-2wody1_i386.deb
Size/MD5 checksum: 77454 2b01b6df4f0859f6975932d2c3889fef
http://security.debian.org/pool/updates/main/i/imlib/gdk-imlib1_1.9.14-2wody1_i386.deb
Size/MD5 checksum: 68730 afaadff6f4e14d885a663bd47c68c97a
http://security.debian.org/pool/updates/main/i/imlib/imlib-dev_1.9.14-2wody1_i386.deb

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:CDRTools RSH环境变量权限提升漏洞

下一篇:Symantec Enterprise Firewall/VPN WAN接口过滤绕过漏洞