安全研究
安全漏洞
Firefly媒体服务器空指针引用漏洞
发布日期:2007-11-02
更新日期:2007-11-05
受影响系统:
Firefly Media Server <= 0.2.4描述:
BUGTRAQ ID: 26309
CVE(CAN) ID: CVE-2007-5824
Firefly是Roku SoundBridge和iTunes所使用的开源媒体服务器。
Firefly在处理畸形文件时存在漏洞,远程攻击者可能利用此漏洞导致服务器崩溃。
在Firefly的webserver.c文件中,ws_getheaders函数的631行存在空指针引用漏洞。如果文件头中的某行(非第一行)不包含“':”的话,就会触发这个漏洞,因为strsep(&last, ':')会对变量last分配NULL,然后代码试图引用last:
strsep(&last,":");
if(last==first) {
DPRINTF(E_WARN,L_WS,"Thread %d: Invalid header: %s\n",
pwsc->threadno,first);
} else {
while(*last==' ')
last++;
webserver.c文件的ws_decodepassword函数的1399行也存在空指针引用漏洞。header变量会一直递增,直到遇到空字符,因此可能会越界引用内存:
/* xlat table is initialized */
while(*header != ' ')
header++;
<*来源:nnp (version5@gmail.com)
链接:http://marc.info/?l=bugtraq&m=119402799908798&w=2
http://marc.info/?l=bugtraq&m=119403073113130&w=2
http://www.debian.org/security/2008/dsa-1597
http://security.gentoo.org/glsa/glsa-200712-18.xml
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
http://marc.info/?l=bugtraq&m=119403073113130&q=p3
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-1597-2)以及相应补丁:
DSA-1597-2:New mt-daapd package fix regression
链接:http://www.debian.org/security/2008/dsa-1597
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2.dsc
Size/MD5 checksum: 765 6ca72b17e6f40d1a02651e94488dcb49
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2.diff.gz
Size/MD5 checksum: 8995 467b2da8c4fda2ce457d58ecdae50ab7
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376.orig.tar.gz
Size/MD5 checksum: 995301 c427c26e93914290b7cd615835ea333a
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_alpha.deb
Size/MD5 checksum: 637480 72c53899fba14e24dab492cf5bf1e7b9
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_amd64.deb
Size/MD5 checksum: 611854 7a2e898b954d46685da0276e6cc50c15
arm architecture (ARM)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_arm.deb
Size/MD5 checksum: 593970 e0d68246bba4c79b9bb939c70bb90def
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_hppa.deb
Size/MD5 checksum: 630644 80c003af6df36becf5c88b12ff3fad94
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_i386.deb
Size/MD5 checksum: 598998 233350989d451e8e5138faaa97c1ffb3
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_ia64.deb
Size/MD5 checksum: 680220 e4a38946ff00aef9721242974ef90385
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_mips.deb
Size/MD5 checksum: 620342 9574939e71636d91df4a86c8f46c51c1
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_mipsel.deb
Size/MD5 checksum: 615384 1dbcb96200006414080402d8d96ec7df
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_powerpc.deb
Size/MD5 checksum: 620380 98d4eef2a6ece485cd519cd82997100c
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_s390.deb
Size/MD5 checksum: 623264 cd1d9cf611212cbeb72347071ec0efa6
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch2_sparc.deb
Size/MD5 checksum: 595508 dd4c18f06eaf2c3b45ffe138780c17ec
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200712-18)以及相应补丁:
GLSA-200712-18:Multi-Threaded DAAP Daemon: Multiple vulnerabilities
链接:http://security.gentoo.org/glsa/glsa-200712-18.xml
所有多线程DAAP守护程序用户都应升级到最新版本:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/mt-daapd-0.2.4.1"
Firefly
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://sourceforge.net/project/showfiles.php?group_id=98211
浏览次数:2886
严重程度:0(网友投票)
绿盟科技给您安全的保障
