Andrew Bishop WWWOFFLE 负Content-length值远程缓冲区溢出漏洞
发布日期:2002-07-18
更新日期:2002-07-26
受影响系统:Andrew Bishop WWWOFFLE 2.7 b
Andrew Bishop WWWOFFLE 2.7 a
Andrew Bishop WWWOFFLE 2.7
不受影响系统:Andrew Bishop WWWOFFLE 2.7 c
描述:
BUGTRAQ ID:
5260
CVE(CAN) ID:
CVE-2002-0818
WWWOFFLE是一款WEB离线浏览器,支持HTTP/FTP代理服务。
WWWOFFLE在处理"Content-Length"字段时存在漏洞,远程攻击者可以利用这个漏洞进行远程缓冲区溢出攻击。
WWWOFFLE对HTTP请求中"Content-Length"字段为负值的请求处理不正确,远程攻击者可以提交一个"Content-Length"字段为负整数的值,当由无符号数值为参数的memcpy()函数处理时,程序会发生缓冲区溢出,精心构建提交HTTP请求数据可能导致攻击者以WWWOFFLE进程的权限在系统上执行任意指令。
<*来源:qitest1 (
qitest1@bespin.org)
链接:
http://archives.neohapsis.com/archives/bugtraq/2002-07/0194.html
*>
建议:
临时解决方法:
如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:
* qitest1 (qitest1_at_bespin.org)提供如下第三方补丁:
==8< wwwoffle-2.7b.patch
- --- wwwoffle-2.7b-old/src/parse.c Sat Mar 23 15:28:36 2002
+++ wwwoffle-2.7b/src/parse.c Fri Jul 12 16:52:46 2002
@@ -180,7 +180,7 @@
if(!strcmp("POST",(*request_head)->method) ||
!strcmp("PUT",(*request_head)->method))
{
- - if(length==-1)
+ if(length < 0)
{free(url);return(NULL);}
*request_body=CreateBody(length);
==8<
厂商补丁:
Andrew Bishop
-------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Andrew Bishop WWWOFFLE 2.7 b:
Andrew Bishop Upgrade wwwoffle-2.7c.tgz
ftp://ftp.demon.co.uk/pub/unix/httpd/wwwoffle-2.7c.tgz
Andrew Bishop WWWOFFLE 2.7 a:
Andrew Bishop Upgrade wwwoffle-2.7c.tgz
ftp://ftp.demon.co.uk/pub/unix/httpd/wwwoffle-2.7c.tgz
Andrew Bishop WWWOFFLE 2.7:
Andrew Bishop Upgrade wwwoffle-2.7c.tgz
ftp://ftp.demon.co.uk/pub/unix/httpd/wwwoffle-2.7c.tgz浏览次数:2890
严重程度:0(网友投票)