安全研究

安全漏洞
Tcl/Tk ReadImage()函数缓冲区溢出漏洞

发布日期:2007-09-21
更新日期:2007-09-28

受影响系统:
John Ousterhout Tcl < 8.4.16
不受影响系统:
John Ousterhout Tcl 8.4.16
描述:
BUGTRAQ  ID: 25826
CVE(CAN) ID: CVE-2007-5137

Tcl是一种简明,高效,可移植的编程语言。

Tcl的工具包处理畸形格式的GIF文件时存在漏洞,远程攻击者可能利用此漏洞通过诱使用户处理恶意文件获取系统的控制。

在Tcl的Tk工具包中,generic/tkImgGIF.c文件中的ReadImage()函数存在缓冲区溢出漏洞。如果用户受骗打开的GIF文件第一个帧后包含有多个更小的帧的话,就可能触发这个溢出,导致执行任意指令。

<*来源:Reinhard Max (max@suse.de
  
  链接:http://sourceforge.net/project/shownotes.php?release_id=541207
        http://secunia.com/advisories/26942/
        http://www.debian.org/security/2009/dsa-1743
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1743-1)以及相应补丁:
DSA-1743-1:New libtk-img packages fix arbitrary code execution
链接:http://www.debian.org/security/2009/dsa-1743

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3.diff.gz
Size/MD5 checksum:   245234 735f4c10ef82cb9d871351b180ae47dc
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3.orig.tar.gz
Size/MD5 checksum:  3918119 ee19a7fdaaa64e9d85eeecd3b78bce8f
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3.dsc
Size/MD5 checksum:      663 3a273d841105b8978f96eca6533eeefd

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_alpha.deb
Size/MD5 checksum:   491110 07e4cdac4f3fba01a3b7d84648c6809d

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_amd64.deb
Size/MD5 checksum:   461822 cae988f3575b2087b7d04eea38a25440

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_arm.deb
Size/MD5 checksum:   436356 7ef635df0204508e8e883eb4a54ae58f

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_i386.deb
Size/MD5 checksum:   430104 b00a0cb661ea599ce296796547520fe0

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_ia64.deb
Size/MD5 checksum:   601608 49309def501db030330443b5bb955d38

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_mips.deb
Size/MD5 checksum:   441054 026d2c2af3bed4b7f3452a7bddfaaee3

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_mipsel.deb
Size/MD5 checksum:   441044 24d9bc504e550643afd51fe1f3fff1e1

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_powerpc.deb
Size/MD5 checksum:   452226 3769f2ee4ac052602db18ad14e5a33d0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_s390.deb
Size/MD5 checksum:   457496 870628476aec308c566d3f4bea697730

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_sparc.deb
Size/MD5 checksum:   424242 5ff1ceda5f92c0ce34398ad1a375b3ce


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1.diff.gz
Size/MD5 checksum:    31608 9aa3a3da9d17f06545411973eb66cf81
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release.orig.tar.gz
Size/MD5 checksum:  3969630 964a692db8a120dc5ed8779521a70bc8
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1.dsc
Size/MD5 checksum:     1207 83e0a72a0c54c38a38f1acc6006dd881

Architecture independent packages:

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-doc_1.3-release-7+lenny1_all.deb
Size/MD5 checksum:    89232 963cfc7f3b480f65d23da12086099bdb

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_alpha.deb
Size/MD5 checksum:   147218 3818c8a511e96717a159608ecffdcc90
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_alpha.deb
Size/MD5 checksum:    59322 fc4813740e77630bb9c69cf3f4636342

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_amd64.deb
Size/MD5 checksum:   136130 2807ef2c010419b0daa1a10bbcf26cfa
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_amd64.deb
Size/MD5 checksum:    61522 b32861939b7bb9e5cb7dd0a0468e46f2

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_arm.deb
Size/MD5 checksum:   129814 ab2b0b3b5ae507ef3aa0f8ad218513a7
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_arm.deb
Size/MD5 checksum:    59210 0a1b9b43cef09ddc4613e5ca1afb9435

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_i386.deb
Size/MD5 checksum:   119526 a7ab424a2a7ad7ec5b2a58097b96b206
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_i386.deb
Size/MD5 checksum:    58924 3a65c23ecc11b3e581cb64d26912daab

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_ia64.deb
Size/MD5 checksum:    59430 e54e0eb23f40d0d197db99d0dd04e651
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_ia64.deb
Size/MD5 checksum:   186630 ebcca2c511bf43f1ef3b12e3adaae97d

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_mips.deb
Size/MD5 checksum:    59338 fde2040f51b9bdb782382bb6bb21e74b
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_mips.deb
Size/MD5 checksum:   128314 fa953d1ad555ba495f4e58ca824d83bc

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_mipsel.deb
Size/MD5 checksum:    59340 9f570ecd96eba5b0c672113e7433c204
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_mipsel.deb
Size/MD5 checksum:   128246 547d8c58d76735d00d93701028d05de7

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_powerpc.deb
Size/MD5 checksum:    59248 95180c3c45dfbdc4dc4356253f915441
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_powerpc.deb
Size/MD5 checksum:   156072 36b72aa56e99d26cfc773f2f5c916970

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_s390.deb
Size/MD5 checksum:   131008 f4401f63947dd3a80f64c4b9abd80924
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_s390.deb
Size/MD5 checksum:    59280 b0784e2a4579dff140ed9c65a7e75997

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_sparc.deb
Size/MD5 checksum:    59192 947382bad7ce91d54a477d59a3cd94d4
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_sparc.deb
Size/MD5 checksum:   121050 000240ceaa3638b39b3ee71bcee37406

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

John Ousterhout
---------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.tcl.tk/software/tcltk/downloadnow84.tml

浏览次数:3692
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障