安全研究

安全漏洞
Blender radiance_hdr.c文件远程栈溢出漏洞

发布日期:2008-04-21
更新日期:2008-04-22

受影响系统:
Blender Foundation Blender 2.45
描述:
BUGTRAQ  ID: 28870
CVE(CAN) ID: CVE-2008-1102

Blender是一款免费的3D建模软件。

Blender的source/blender/imbuf/intern/radiance_hdr.c文件中的imb_loadhdr()函数存在栈溢出漏洞,如果用户受骗打开了包含有恶意Radiance RGBE图形的特制*.blend文件的话,就可以触发这个溢出,导致执行任意指令。

<*来源:Stefan Cornelius
  
  链接:http://secunia.com/secunia_research/2008-16/advisory/
        http://www.debian.org/security/2008/dsa-1567
        http://security.gentoo.org/glsa/glsa-200805-12.xml
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1567-1)以及相应补丁:
DSA-1567-1:New blender packages fix arbitrary code execution
链接:http://www.debian.org/security/2008/dsa-1567

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1.dsc
Size/MD5 checksum:     1124 2304ad7948f44a1c087e8906f9a676bd
http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1.diff.gz
Size/MD5 checksum:    29617 79175d7996d5e0ea9a981b5c0cdac8ad
http://security.debian.org/pool/updates/main/b/blender/blender_2.42a.orig.tar.gz
Size/MD5 checksum: 12295244 3d60b7ebe0dea47da12744fe2462d96c

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_alpha.deb
Size/MD5 checksum:  7062442 57776aac61b9871dcf66da61be6be9f5

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_amd64.deb
Size/MD5 checksum:  6354226 78f6f086e2a2598fb0b40d861a203dfe

arm architecture (ARM)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_arm.deb
Size/MD5 checksum:  6559778 cea3f23a01a0147b43698494a893effd

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_hppa.deb
Size/MD5 checksum:  7243926 233690a809c3f39aa742697705e17429

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_i386.deb
Size/MD5 checksum:  6303940 57ead1737c28b69c2a82fd29bb41e814

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_ia64.deb
Size/MD5 checksum:  8875392 2d30aa1cd1838e96a4551df38fc7fdf5

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_mips.deb
Size/MD5 checksum:  6187970 9684782927a3d39931d19575dd194bda

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_mipsel.deb
Size/MD5 checksum:  6119168 bdd46a3989ed69a645cf53f4cf526f47

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_powerpc.deb
Size/MD5 checksum:  6536610 8cca411968cbabba698b5938bd486f81

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_s390.deb
Size/MD5 checksum:  6447592 91f556b6e00439aae903ce9cd63dc14c

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/b/blender/blender_2.42a-7.1+etch1_sparc.deb
Size/MD5 checksum:  6421798 f5855fdef3d8ca0b896d4720b9ef4651

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200805-12)以及相应补丁:
GLSA-200805-12:Blender: Multiple vulnerabilities
链接:http://security.gentoo.org/glsa/glsa-200805-12.xml

所有Blender用户都应升级到最新版本:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43-r2"

Blender Foundation
------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://blender.org/

浏览次数:2774
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障