安全研究

安全漏洞
TCPreen FD_SET()函数远程栈溢出漏洞

发布日期:2007-12-25
更新日期:2007-12-26

受影响系统:
Rémi Denis-Courmont TCPreen 1.4.3
Rémi Denis-Courmont TCPreen 1.4.2
Rémi Denis-Courmont TCPreen 1.4.1
Rémi Denis-Courmont TCPreen 1.4
不受影响系统:
Rémi Denis-Courmont TCPreen 1.4.4
描述:
BUGTRAQ  ID: 27018
CVE(CAN) ID: CVE-2007-6562

TCPreen是用于监控和分析客户端与服务器之间传输数据的工具。

TCPreen的libsolve/sockprot.cpp文件中在调用SocketAddress::Connect()中的FD_SET()时存在栈溢出漏洞,在某些配置中如果远程攻击者创建了多个并行连接的话,就可以触发这个溢出,导致执行任意指令。

<*来源:TCPreen
  
  链接:http://secunia.com/advisories/28217/
        http://anonsvn.remlab.net/svn/tcpreen/tags/1.4.4/NEWS
        http://www.debian.org/security/2008/dsa-1443
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1443-1)以及相应补丁:
DSA-1443-1:New tcpreen packages fix denial of service
链接:http://www.debian.org/security/2008/dsa-1443

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.dsc
Size/MD5 checksum:      579 83c33a7131f3191048aba4b610e292ca
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3.orig.tar.gz
Size/MD5 checksum:   232290 5600968d012f8353e4e0797d4c330393
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.diff.gz
Size/MD5 checksum:    26016 b1af9b7571c037713b123f33e5e79721

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_alpha.deb
Size/MD5 checksum:    44064 5dc26f1233f232305b7c8d2e2e2cb4ac

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_amd64.deb
Size/MD5 checksum:    42494 5cc27918abcac4a19eb661894005e963

arm architecture (ARM)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_arm.deb
Size/MD5 checksum:    39378 10c0d8bd70154755e372318e39f10266

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_hppa.deb
Size/MD5 checksum:    43848 7039041a01ddcd25e74cfb6c025d3e6c

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_i386.deb
Size/MD5 checksum:    40274 bcd58bac3ae59767861a9fee6653e882

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_ia64.deb
Size/MD5 checksum:    48438 85ac614d61faa5a66d7e14efd5490daf

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mips.deb
Size/MD5 checksum:    43610 9fb5942fc0d95e87c2a8e3964c30b8d7

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mipsel.deb
Size/MD5 checksum:    43620 e9b81ad8b5e0f05501c264b5efd6ed7f

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_powerpc.deb
Size/MD5 checksum:    40848 43b0d65c0a8445d7d5880f87a5fbb005

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_s390.deb
Size/MD5 checksum:    41020 e4d80551b7ffe958f9ad7103b2973087

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_sparc.deb
Size/MD5 checksum:    39366 e897ed3d4b1d0b85225f88f8a0cc0990

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Rémi Denis-Courmont
--------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.remlab.net/tcpreen/#platform

浏览次数:2914
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障