CVE编号
CVE-2002-1247利用情况
暂无补丁情况
N/A披露时间
2002-11-29漏洞描述
LISa中的缓冲区溢出允许本地用户通过resLISa守护程序的长LOGNAME环境变量访问原始套接字。解决建议
KDE---KDE已经为此发布了一个安全公告(KDE-20021111-2)以及相应补丁:KDE-20021111-2:resLISa / LISa Vulnerabilities链接:http://www.kde.org/info/security/advisory-20021111-2.txt补丁下载:KDE Upgrade KDE 3.0.5http://download.kde.org/stable/3.0.5/Debian------Debian已经为此发布了一个安全公告(DSA-193-1)以及相应补丁:DSA-193-1:New klisa packages fix buffer overflow链接:http://www.debian.org/security/2002/dsa-193补丁下载:Source archives:http://security.debian.org/pool/updates/main/k/kdenetwork/kdenetwork_2.2.2-14.2.dscSize/MD5 checksum: 902 30ea9de901850dd86078a4579a15a828http://security.debian.org/pool/updates/main/k/kdenetwork/kdenetwork_2.2.2-14.2.diff.gzSize/MD5 checksum: 27235 e78c14ecc95942e66a53a3d09e6282behttp://security.debian.org/pool/updates/main/k/kdenetwork/kdenetwork_2.2.2.orig.tar.gzSize/MD5 checksum: 3319181 25fbfc5d2592937480c0d3796a2416e0Alpha architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_alpha.debSize/MD5 checksum: 188864 b1693a71418d3175b7a60594a6462ed8ARM architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_arm.debSize/MD5 checksum: 155726 333a771bfdbf7b4bc4bb7f16370d5092Intel IA-32 architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_i386.debSize/MD5 checksum: 150248 447ca978df2eabe8971f0106d75dd5dfIntel IA-64 architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_ia64.debSize/MD5 checksum: 210980 b17bb3613cf9fc2aead59062f9a1451eHP Precision architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_hppa.debSize/MD5 checksum: 217942 65650fd70d68aadd52ade4e9f2cdda12Motorola 680x0 architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_m68k.debSize/MD5 checksum: 141476 1ae9ae0e344b160b1c1291fef6f053afBig endian MIPS architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_mips.debSize/MD5 checksum: 143114 71aed55cd0d402bcd560b2f26b9a228bLittle endian MIPS architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_mipsel.debSize/MD5 checksum: 142900 a0396da967699113e88c6494fd3404e3PowerPC architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_powerpc.debSize/MD5 checksum: 151782 fd2a725326925326882e98cc9116e91aIBM S/390 architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_s390.debSize/MD5 checksum: 143358 f20e164fd56ac9d94c8298f07fb3d9a3Sun Sparc architecture:http://security.debian.org/pool/updates/main/k/kdenetwork/klisa_2.2.2-14.2_sparc.debSize/MD5 checksum: 151462 2fca224f1668dfa48e46261c047b5d80补丁安装方法:1. 手工安装补丁包:首先,使用下面的命令来下载补丁软件:# wget url (url是补丁下载链接地址然后,使用下面的命令来安装补丁:# dpkg -i file.deb (file是相应的补丁名2. 使用apt-get自动安装补丁包:首先,使用下面的命令更新内部数据库:# apt-get update然后,使用下面的命令安装更新软件包:# apt-get upgradeLISa----目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:LISa Upgrade lisa-0.2.2.tar.bz2http://lisa-home.sourceforge.net/src/lisa-0.2.2.tar.bz2
参考链接 |
|
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0068.html | |
http://marc.info/?l=bugtraq&m=103704823501757&w=2 | |
http://marc.info/?l=bugtraq&m=103712329102632&w=2 | |
http://marc.info/?l=bugtraq&m=103728981029342&w=2 | |
http://www.ciac.org/ciac/bulletins/n-020.shtml | |
http://www.debian.org/security/2002/dsa-193 | |
http://www.idefense.com/advisory/11.11.02.txt | |
http://www.iss.net/security_center/static/10592.php | |
http://www.mandriva.com/security/advisories?name=MDKSA-2002:080 | |
http://www.redhat.com/support/errata/RHSA-2002-220.html | |
http://www.securityfocus.com/bid/6157 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | kde | klisa | 2.2.2 | - | |||||
运行在以下环境 | |||||||||
应用 | lisa | lisa | 0.1 | - | |||||
运行在以下环境 | |||||||||
应用 | lisa | lisa | 0.1.2 | - |
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...