int(2782)

Vulnerability Bulletins


Denegación de servicio en screen

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software screen < 4.0.3

Description

Se han descubierto múltiples vulnerabilidades en screen versiones anteriores a 4.0.3. Las vulnerabilidades residen en diversos errores en la función "utf8_handle_comb()" del fichero encoding.c encargado de combinar caracteres utf8.

Un atacante remoto podría causar una denegación de servicio a través de ciertas secuencias UTF8.

Solution



Actualización de software

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/screen-4.0.2-1.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/screen-4.0.2-1.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/screen-4.0.2-1.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/screen-4.0.2-1.1.C30mdk.src.rpm

Mandriva Linux 2006
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/screen-4.0.2-6.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/screen-4.0.2-6.1.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/screen-4.0.2-6.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/screen-4.0.2-6.1.20060mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/screen-4.0.2-9.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/screen-4.0.2-9.1mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/screen-4.0.2-9.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/screen-4.0.2-9.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/screen-4.0.2-6.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/screen-4.0.2-6.1.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/screen-4.0.2-6.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/screen-4.0.2-6.1.20060mlcs4.src.rpm

Debian

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.dsc
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_amd64.deb
ARM
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_ia64.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_s390.deb

Apple
Mac OS X (Universal)
http://www.apple.com/support/downloads/securityupdate2007005universal.html
Mac OS X (PPC)
http://www.apple.com/support/downloads/securityupdate2007005ppc.html
Mac OS X (Server)
http://www.apple.com/support/downloads/securityupdate20070051039server.html
Mac OS X (Client)
http://www.apple.com/support/downloads/securityupdate20070051039client.html

Standar resources

Property Value
CVE CVE-2006-4573
BID 20727

Other resources

Mandriva Security Advisory (MDKSA-2006:191)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:191

Debian Security Advisory (DSA 1202-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00298.html

Apple Security Update (305530)
http://docs.info.apple.com/article.html?artnum=305530

Version history

Version Comments Date
1.0 Aviso emitido 2006-10-30
1.1 Aviso emitido por Debian (DSA 1202-1) 2006-11-02
1.2 Aviso emitido por Apple (305530) 2007-05-29
Ministerio de Defensa
CNI
CCN
CCN-CERT