安全研究

安全漏洞
libxml2栈溢出和释放后使用漏洞

发布日期:2009-08-10
更新日期:2009-08-11

受影响系统:
XMLSoft Libxml2 <= 2.6.26
描述:
BUGTRAQ  ID: 36010
CVE(CAN) ID: CVE-2009-2414,CVE-2009-2416

libxml2软件包提供允许用户操控XML文件的函数库,包含有读、修改和写XML和HTML文件支持。

libxml库处理DTD中根XML文档元素定义的方式存在栈溢出漏洞,解析Notation和Enumeration属性类型的方式存在多个释放后使用漏洞。远程攻击者可以提供特制的XML文件,如果本地用户受骗打开了该文件,就会导致拒绝服务(应用程序崩溃)。

<*来源:Jan Lieskovsky (jlieskov@redhat.com
  
  链接:https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=515195
        https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=515205
        http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540865
        https://www.redhat.com/support/errata/RHSA-2009-1206.html
        http://www.debian.org/security/2009/dsa-1861
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1861-1)以及相应补丁:
DSA-1861-1:New libxml packages fix several issues
链接:http://www.debian.org/security/2009/dsa-1861

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17-14+etch1.diff.gz
Size/MD5 checksum:   366268 512cbc5adce12b54741cadd80e62eb7d
http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17.orig.tar.gz
Size/MD5 checksum:  1016403 b8f01e43e1e03dec37dfd6b4507a9568
http://security.debian.org/pool/updates/main/libx/libxml/libxml_1.8.17-14+etch1.dsc
Size/MD5 checksum:      716 26bf8a9d037f583d4a9dc1dab5aa4792

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_alpha.deb
Size/MD5 checksum:   429312 749dda70c33689b70d13469f6c3357ac
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_alpha.deb
Size/MD5 checksum:   233288 02b88e80b91681e956cb4ab19acfeca6

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_amd64.deb
Size/MD5 checksum:   223558 ceb0d44c5a6a50373af43359e83667e7
http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_amd64.deb
Size/MD5 checksum:   383872 fc52303783696d53c20999a82e962bd7

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_arm.deb
Size/MD5 checksum:   356830 43860080fa42274a3d7ad649a6dea3fd
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_arm.deb
Size/MD5 checksum:   197970 63134af5530d4ab6f1a41046136ea62d

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_hppa.deb
Size/MD5 checksum:   429646 938ea12262d6fe02426a8d59f5242794
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_hppa.deb
Size/MD5 checksum:   240036 52f8f7e7c277f0b37fdba7e4b1609f19

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_i386.deb
Size/MD5 checksum:   212762 b25bde43ee075fa743b1f037a43919b8
http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_i386.deb
Size/MD5 checksum:   364460 0d3f3229b87c1b2d2ff614679d805600

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_ia64.deb
Size/MD5 checksum:   498736 7fa5b542dcd264d899ea0b49cdf4ffdc
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_ia64.deb
Size/MD5 checksum:   315918 7e2351fbb88e55dcabcd4bbca3bb26c0

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_mips.deb
Size/MD5 checksum:   411816 f32a3c2d678a256691a7a6b300467eeb
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_mips.deb
Size/MD5 checksum:   209842 603a443d76deb3bafea7e288f102d2bb

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_mipsel.deb
Size/MD5 checksum:   408602 36e9600b0be7e846b4788cd475413858
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_mipsel.deb
Size/MD5 checksum:   210312 e78866fce8cdc8fd0854203a73f50a6e

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_powerpc.deb
Size/MD5 checksum:   213862 5a6fde00e79c0ab8a873f0f0d2bfc028
http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_powerpc.deb
Size/MD5 checksum:   388622 c93294decb6b25bb4c3fe43dc0fa25e2

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libx/libxml/libxml-dev_1.8.17-14+etch1_s390.deb
Size/MD5 checksum:   387402 43844dfcb0401e9fd1ac3d4c80281f83
http://security.debian.org/pool/updates/main/libx/libxml/libxml1_1.8.17-14+etch1_s390.deb
Size/MD5 checksum:   226562 c9da4865e04f157ceacde8f59b040f28

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2009:1206-01)以及相应补丁:
RHSA-2009:1206-01:Moderate: libxml and libxml2 security update
链接:https://www.redhat.com/support/errata/RHSA-2009-1206.html

浏览次数:3000
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障