安全研究

安全漏洞
inotify-tools inotifytools_snprintf()函数本地缓冲区溢出漏洞

发布日期:2007-09-19
更新日期:2007-09-19

受影响系统:
inotify-tools inotify-tools 3.9
inotify-tools inotify-tools 3.8
inotify-tools inotify-tools 3.6
inotify-tools inotify-tools 3.5
inotify-tools inotify-tools 3.4
inotify-tools inotify-tools 3.3
inotify-tools inotify-tools 3.2
inotify-tools inotify-tools 3.10
inotify-tools inotify-tools 3.1
inotify-tools inotify-tools 3.0
inotify-tools inotify-tools 2.6
inotify-tools inotify-tools 2.5
inotify-tools inotify-tools 2.4
inotify-tools inotify-tools 2.3
inotify-tools inotify-tools 2.2
不受影响系统:
inotify-tools inotify-tools 3.11
描述:
BUGTRAQ  ID: 25724
CVE(CAN) ID: CVE-2007-5037

inotify-tools是一个C程序库和一些命令行工具用于管理Linux文件系统。

inotify-tools的实现上存在缓冲区溢出漏洞,本地攻击者可能通过使用了inotify-tools库的应用程序提升自己的权限。

inotify-tools代码文件src/inotifytools.c中的inotifytools_snprintf()函数存在缓冲区溢出漏洞,攻击者可以通过在特定目录中指定创建超长文件名的文件导致缓冲区溢出,从而执行任意指令。

<*链接:http://secunia.com/advisories/26825/
        http://www.debian.org/security/2007/dsa-1440
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1440-1)以及相应补丁:
DSA-1440-1:New inotify-tools packages fix arbitrary code
链接:http://www.debian.org/security/2007/dsa-1440

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2.dsc
Size/MD5 checksum:      624 883ee55627b7becb5a9ca1a2e569281b
http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3.orig.tar.gz
Size/MD5 checksum:   369780 204ef6e0b855ec4315f4f13e2d3d1e1a
http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2.diff.gz
Size/MD5 checksum:     5311 7bde9f27b0bb470a44d64b40b1e217e1

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_alpha.deb
Size/MD5 checksum:    51356 81b86adf6ba52bac0c463948cbbe2b49

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_amd64.deb
Size/MD5 checksum:    44668 b64ada55dc7a779df25b8aaf69347ef0

arm architecture (ARM)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_arm.deb
Size/MD5 checksum:    41972 6a7d420d5d00261ad40cc12ada606144

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_hppa.deb
Size/MD5 checksum:    48782 0f85ebaecd2c1449afc7c31bbf1b1ac5

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_i386.deb
Size/MD5 checksum:    78260 e462da2503c92d98510647fb0c1f44eb

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_ia64.deb
Size/MD5 checksum:    58450 f3e9432dd2725689a945e85f4c9a6fc3

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_mips.deb
Size/MD5 checksum:    44252 d7166ae065ed439dfee037a20ce2f7eb

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_mipsel.deb
Size/MD5 checksum:    43936 903bb81400b5769e787a871634335188

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_powerpc.deb
Size/MD5 checksum:    49284 145b4a75de5c8abaf38390f1f69789e0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_s390.deb
Size/MD5 checksum:    45262 9346fa472ba657b973fd7c837b94024c

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/inotify-tools/inotify-tools_3.3-2_sparc.deb
Size/MD5 checksum:    43658 eb008682403c08de1baa65d79f46eaa5

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

inotify-tools
-------------
目前厂商已经在最新版本的软件中修复了这个安全问题,请到厂商的主页下载:

http://sourceforge.net/project/showfi...ckage_id=196347&release_id=540277

浏览次数:3036
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障