CVE编号
CVE-2010-1411利用情况
暂无补丁情况
官方补丁披露时间
2010-06-18漏洞描述
在3.9.3之前,LibT IF F中的FAX3解码器中的fax3Setup State函数中的多个整数溢出,如苹果MacOSX10.5.8和MacOSX10.6之前的10.6.4中使用的,允许远程攻击者通过精心制作的TIFF文件执行任意代码或导致拒绝服务(应用程序崩溃),触发基于堆的缓冲区溢出。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html | |
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html | |
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | |
http://marc.info/?l=oss-security&m=127731610612908&w=2 | |
http://secunia.com/advisories/40181 | |
http://secunia.com/advisories/40196 | |
http://secunia.com/advisories/40220 | |
http://secunia.com/advisories/40381 | |
http://secunia.com/advisories/40478 | |
http://secunia.com/advisories/40527 | |
http://secunia.com/advisories/40536 | |
http://secunia.com/advisories/50726 | |
http://security.gentoo.org/glsa/glsa-201209-02.xml | |
http://securitytracker.com/id?1024103 | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackw... | |
http://support.apple.com/kb/HT4188 | |
http://support.apple.com/kb/HT4196 | |
http://support.apple.com/kb/HT4220 | |
http://www.redhat.com/support/errata/RHSA-2010-0519.html | |
http://www.redhat.com/support/errata/RHSA-2010-0520.html | |
http://www.remotesensing.org/libtiff/v3.9.3.html | |
http://www.securityfocus.com/bid/40823 | |
http://www.ubuntu.com/usn/USN-954-1 | |
http://www.vupen.com/english/advisories/2010/1435 | |
http://www.vupen.com/english/advisories/2010/1481 | |
http://www.vupen.com/english/advisories/2010/1512 | |
http://www.vupen.com/english/advisories/2010/1638 | |
http://www.vupen.com/english/advisories/2010/1731 | |
http://www.vupen.com/english/advisories/2010/1761 | |
https://bugzilla.redhat.com/show_bug.cgi?id=592361 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | 10.5.8 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | 10.6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | 10.6.1 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | 10.6.2 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | 10.6.3 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x_server | 10.5.8 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x_server | 10.6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x_server | 10.6.1 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x_server | 10.6.2 | - | |||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x_server | 10.6.3 | - | |||||
运行在以下环境 | |||||||||
系统 | centos_5 | tiff | * |
Up to (excluding) 3.8.2-7.el5_5.5 |
|||||
运行在以下环境 | |||||||||
系统 | debian_5.0 | tiff | * |
Up to (excluding) 3.8.2-11.3 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_5 | tiff | * |
Up to (excluding) 3.8.2-7.el5_5.5 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | tiff | * |
Up to (excluding) 3.8.2-7.el5_5.5 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_5 | libtiff | * |
Up to (excluding) 0:3.6.1-12.el4_8.5 |
|||||
运行在以下环境 | |||||||||
系统 | sles_11 | libtiff3 | * |
Up to (excluding) 3.8.2-141.142 |
|||||
- 攻击路径 本地
- 攻击复杂度 容易
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...