安全研究
安全漏洞
Ethereal ASN.1字符串内存分配拒绝服务攻击漏洞
发布日期:2002-04-25
更新日期:2002-04-29
受影响系统:
Ethereal Group Ethereal 0.9.2不受影响系统:
Ethereal Group Ethereal 0.9.1
- Caldera SCO UnixWare 7.0
- Compaq Tru64 Unix 5.0
- HP HP-UX 11.0
- IBM AIX 5.1
- Linux系统
- Microsoft Windows XP
- Microsoft Windows NT
- Microsoft Windows ME
- Microsoft Windows 98 SE
- Microsoft Windows 98
- Microsoft Windows 95
- Microsoft Windows 2000 SP3
- NetBSD 1.5
- OpenBSD 3.0
- SGI IRIX 6.0
- Sun Solaris 8.0
Ethereal Group Ethereal 0.9.3描述:
BUGTRAQ ID: 4604
CVE(CAN) ID: CVE-2002-0353
Ethereal是一款免费开放源代码的网络通信分析工具,由Ethereal项目组开发和维护。
Ethereal在处理ASN.1信息时存在漏洞,可导致攻击者进行拒绝服务攻击。
攻击者可以使用非法数据传递给Ethereal中ASN.1字符解析函数,可导致不正确的分配内存,使程序崩溃。其中SNMP、LDAP、COPS和Kerberos都用到此解析函数。
<*来源:Ethereal Development Team
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000474
http://www.debian.org/security/2002/dsa-130
*>
建议:
厂商补丁:
Conectiva
---------
Conectiva已经为此发布了一个安全公告(CLA-2002:474)以及相应补丁:
CLA-2002:474:ethereal
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000474
补丁下载:
ftp://atualizacoes.conectiva.com.br/5.0/i386/ethereal-0.9.3-1U50_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/ethereal-0.9.3-1U50_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/ethereal-0.9.3-1U51_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/ethereal-0.9.3-1U51_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/ethereal-0.9.3-1U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/ethereal-0.9.3-1U60_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ethereal-0.9.3-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/ethereal-0.9.3-1U70_1cl.src.rpm
Conectiva Linux version 6.0及以上版本的用户可以使用apt进行RPM包的更新:
- 把以下的文本行加入到/etc/apt/sources.list文件中:
rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
(如果你不是使用6.0版本,用合适的版本号代替上面的6.0)
- 执行: apt-get update
- 更新以后,再执行: apt-get upgrade
Debian
------
Debian已经为此发布了一个安全公告(DSA-130-1)以及相应补丁:
DSA-130-1:memory allocation error in ethereal
链接:http://www.debian.org/security/2002/dsa-130
补丁下载:
Source archives:
http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0-3potato.diff.gz
http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0-3potato.dsc
http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0.orig.tar.gz
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/ethereal_0.8.0-3potato_alpha.deb
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-ar
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
RedHat
------
Red Hat RPM ethereal-0.9.4-0.7.2.0.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-0.9.4-0.7.2.0.i386.rpm
SCO
---
SCO RPM ethereal-0.9.4-1.i386.rpm
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-037.0/RPMS/ethereal-0.9.4-1.i386.rpm
SCO RPM ethereal-0.9.4-1.i386.rpm
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-037.0/RPMS/ethereal-0.9.4-1.i386.rpm
SCO RPM ethereal-0.9.4-1.i386.rpm
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-037.0/RPMS/ethereal-0.9.4-1.i386.rpm
SCO RPM ethereal-0.9.4-1.i386.rpm
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-037.0/RPMS/ethereal-0.9.4-1.i386.rpm
Ethereal Group
--------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Ethereal Group Ethereal 0.9.1:
Ethereal Group Upgrade ethereal-0.9.3.tar.gz
http://www.ethereal.com/distribution/ethereal-0.9.3.tar.gz
Ethereal Group Ethereal 0.9.2:
Ethereal Group Upgrade ethereal-0.9.3.tar.gz
http://www.ethereal.com/distribution/ethereal-0.9.3.tar.gz
浏览次数:3826
严重程度:0(网友投票)
绿盟科技给您安全的保障