安全研究

安全漏洞
Linux Kernel NCPFS ncp_lookup()未明本地权限提升漏洞

发布日期:2004-02-18
更新日期:2004-03-02

受影响系统:
Linux kernel 2.4.9
Linux kernel 2.4.8
Linux kernel 2.4.7
Linux kernel 2.4.6
Linux kernel 2.4.5
Linux kernel 2.4.4
Linux kernel 2.4.3
Linux kernel 2.4.24
Linux kernel 2.4.23
Linux kernel 2.4.22
Linux kernel 2.4.21
Linux kernel 2.4.20
Linux kernel 2.4.2
Linux kernel 2.4.19
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
Linux kernel 2.4.12
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.1
Linux kernel 2.4
Linux kernel 2.4.18
    - Conectiva Linux 8.0
    - Conectiva Linux 7.0
    - Debian Linux 3.0
    - RedHat Linux 8.0
    - RedHat Linux 7.3
    - Slackware Linux 8.1
    - Slackware Linux 8.0
    - SuSE Linux 8.1
    - SuSE Linux 8.0
描述:
BUGTRAQ  ID: 9691
CVE(CAN) ID: CVE-2004-0010

Linux是一款开放源代码操作系统。

Linux内核支持的NCPFS存在安全问题,本地攻击者可以利用这个漏洞提升权限。

ncpfs只用于允许系统挂接NetWare服务卷或打印到NetWare打印服务器操作,其包含的ncp_looup()函数存在问题,可导致权限提升问题。

<*来源:Arjan van de Ven
  
  链接:http://www.linux-mandrake.com/en/security/2004/2004-015.php
        http://www.linux-mandrake.com/en/security/2004/2004-015.php
        https://www.redhat.com/support/errata/RHSA-2004-065.html
                http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000820
*>

建议:
厂商补丁:

Conectiva
---------
Conectiva已经为此发布了一个安全公告(CLA-2004:820)以及相应补丁:
CLA-2004:820:kernel
链接:http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000820

补丁下载:

Linux kernel 2.4.19:

Conectiva Upgrade devfsd-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/devfsd-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-BOOT-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-BOOT-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-doc-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-doc-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-headers-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-headers-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-rbc-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-rbc-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i386.rpm

Conectiva Upgrade kernel-2.4.19-1U80_21cl.i586.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i586.rpm

Conectiva Upgrade kernel-2.4.19-1U80_21cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i686.rpm

Conectiva Upgrade kernel-enterprise-2.4.19-1U80_21cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-enterprise-2.4.19-1U80_21cl.i686.rpm

Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i586.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i586.rpm

Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i686.rpm

Linux kernel 2.4.21:

Conectiva Upgrade devfsd-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/devfsd-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i586.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i586.rpm

Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i686.rpm

Conectiva Upgrade kernel24-BOOT-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-BOOT-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-doc-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-doc-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.i686.rpm

Conectiva Upgrade kernel24-headers-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-headers-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-rbc-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-rbc-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i386.rpm

Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i586.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i586.rpm

Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i686.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i686.rpm

Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.athlon.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.athlon.rpm

Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.athlon.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.athlon.rpm

Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.athlon.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.athlon.rpm

Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.pentium4.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.pentium4.rpm

Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.pentium4.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.pentium4.rpm

Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.pentium4.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.pentium4.rpm

MandrakeSoft
------------
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:015-1)以及相应补丁:
MDKSA-2004:015-1:Updated x86_64 kernel packages fix multiple vulnerabilities
链接:http://www.linux-mandrake.com/en/security/2004/2004-015.php

补丁下载:

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2004:065-01)以及相应补丁:
RHSA-2004:065-01:Updated kernel packages resolve security vulnerabilities
链接:https://www.redhat.com/support/errata/RHSA-2004-065.html

补丁下载:

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/kernel-2.4.20-30.9.src.rpm

athlon:
ftp://updates.redhat.com/9/en/os/athlon/kernel-2.4.20-30.9.athlon.rpm
ftp://updates.redhat.com/9/en/os/athlon/kernel-smp-2.4.20-30.9.athlon.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/kernel-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-BOOT-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-doc-2.4.20-30.9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/kernel-source-2.4.20-30.9.i386.rpm

i686:
ftp://updates.redhat.com/9/en/os/i686/kernel-2.4.20-30.9.i686.rpm
ftp://updates.redhat.com/9/en/os/i686/kernel-bigmem-2.4.20-30.9.i686.rpm
ftp://updates.redhat.com/9/en/os/i686/kernel-smp-2.4.20-30.9.i686.rpm
可使用下列命令安装补丁:

rpm -Fvh [文件名]

S.u.S.E.
--------
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2004:005)以及相应补丁:
SuSE-SA:2004:005:Linux Kernel
链接:

补丁下载:

Linux kernel 2.4.20:

SuSE Upgrade k_deflt-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_deflt-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_athlon-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_athlon-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_psmp-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_psmp-2.4.20-105.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp-2.4.20-105.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/k_smp-2.4.20-105.i586.rpm
Intel i386 Platform

Linux kernel 2.4.21:

SuSE Upgrade k_deflt-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_deflt-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_smp4G-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_smp4G-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_um-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_um-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_athlon-2.4.21-192.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/k_athlon-2.4.21-192.i586.rpm
Intel i386 Platform

SuSE Upgrade k_deflt-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_deflt-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_athlon-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_athlon-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_psmp-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_psmp-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_smp-2.4.21-189.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/k_smp-2.4.21-189.i586.rpm
Intel i386 Platform/SuSE 8.1

SuSE Upgrade k_deflt-2.4.21-201.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_deflt-2.4.21-201.x86_64.rpm
x86_64/SuSE 9.0

SuSE Upgrade k_smp-2.4.21-201.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_smp-2.4.21-201.x86_64.rpm
x86_64/SuSE 9.0

浏览次数:3599
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障