安全研究

安全漏洞
Psi畸形报文远程拒绝服务漏洞

发布日期:2008-12-23
更新日期:2008-12-25

受影响系统:
Psi Psi 0.12
描述:
BUGTRAQ  ID: 32987
CVE(CAN) ID: CVE-2008-6393

Psi是用于Jabber IM网络的免费即时消息客户端。

Psi客户端的文件传输功能中存在堆溢出漏洞,如果远程攻击者向默认监听于8010/TCP端口的文件传输协议发送了特制报文的话,就可以触发这个溢出,导致拒绝服务的情况。

<*来源:sha0 (sha0@badchecksum.net
  
  链接:http://secunia.com/advisories/33311/
        http://www.debian.org/security/2009/dsa-1741
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

http://milw0rm.com/exploits/7555

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1741-1)以及相应补丁:
DSA-1741-1:New psi packages fix denial of service
链接:http://www.debian.org/security/2009/dsa-1741

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9.dsc
Size/MD5 checksum:     1010 ebc7d52229204de80bd31de70c7f7c59
http://security.debian.org/pool/updates/main/p/psi/psi_0.11.orig.tar.gz
Size/MD5 checksum:  2315401 637941349f1c28ed88242d7e3e5abcbc
http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9.diff.gz
Size/MD5 checksum:    11710 d2c26bc079fc6a2661f3a23cc90d34e7

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_alpha.deb
Size/MD5 checksum:  3104112 7b3df70383c49ed53db3f44d8c5c04be

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_amd64.deb
Size/MD5 checksum:  2791050 5787e7983a52abfa5fdfa9433d0f8cee

arm architecture (ARM)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_arm.deb
Size/MD5 checksum:  3286870 a2ab92e18cbd3a9dc81a5a2854cb6024

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_armel.deb
Size/MD5 checksum:  2762622 192af86f8ec8f86480106a7813a2e723

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_hppa.deb
Size/MD5 checksum:  3051074 01ccd196064b6c6c9ec471e35778f197

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_i386.deb
Size/MD5 checksum:  2724144 084ef85145891ed87765637aa0424bb3

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_ia64.deb
Size/MD5 checksum:  3362584 a91a96f869b2dd368acb36e5d827c91c

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_mips.deb
Size/MD5 checksum:  2873922 55ee75703c414d4b9e4d3bf12c83782a

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_mipsel.deb
Size/MD5 checksum:  2837348 b8241b110f23cd31e4125655fca8d591

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_powerpc.deb
Size/MD5 checksum:  2798776 4a09637ea8fad49165935c53dd68203e

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_s390.deb
Size/MD5 checksum:  2697752 5b58a82c9aaec2c1ddfdaf24c2c60ff0

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/p/psi/psi_0.11-9_sparc.deb
Size/MD5 checksum:  2817968 773db6e6f9e4225f546f9351e20718ea

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:2891
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障