int(566)

Vulnerability Bulletins


Ejecución de código arbitrario en Linux mediante mc

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Debian GNU/Linux 3.0 (woody)
Red Hat Linux 9
Mandrake Linux 9.1, 9.2, 9.2/AMD64, Corporate Server 2.1

Description

Se ha descubierto una vulnerabilidad en el Midnight Commander, un gestor de archivos conocido abreviadamente como mc. La explotación de esta vulnerabilidad podría ser aprovechada para, mediante un archivo .tar (por ejemplo), provocar la ejecución de código arbitrario si ese archivo es abierto por el Midnight Commander (mc).

Solution

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de software

Debian GNU/Linux 3.0 (woody)
Source:
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.dsc
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.diff.gz
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_mips.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_sparc.deb

Linux RedHat 9.0
SRPMS
ftp://updates.redhat.com/9/en/os/SRPMS/mc-4.6.0-7.9.src.rpm
i386
ftp://updates.redhat.com/9/en/os/i386/mc-4.6.0-7.9.i386.rpm

Linux Mandrake 9.1
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/RPMS/mutt-1.4.1i-1.2.91mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/SRPMS/mutt-1.4.1i-1.2.91mdk.src.rpm
PPC
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/RPMS/mutt-1.4.1i-1.2.91mdk.ppc.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/SRPMS/mutt-1.4.1i-1.2.91mdk.src.rpm

Linux Mandrake 9.2
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/RPMS/mutt-1.4.1i-3.1.92mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/SRPMS/mutt-1.4.1i-3.1.92mdk.src.rpm
AMD64
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/RPMS/mutt-1.4.1i-3.1.92mdk.amd64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/SRPMS/mutt-1.4.1i-3.1.92mdk.src.rpm

Linux Mandrake Corporate Server 2.1
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/corporate/2.1/RPMS/mutt-1.4.1i-1.2.C21mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/corporate/2.1/SRPMS/mutt-1.4.1i-1.2.C21mdk.src.rpm
x86_64
ftp://ftp.rediris.es/mirror/mandrake/updates/x86_64/corporate/2.1/RPMS/mutt-1.4.1i-1.2.C21mdk.x86_64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/x86_64/corporate/2.1/SRPMS/mutt-1.4.1i-1.2.C21mdk.src.rpm

Standar resources

Property Value
CVE CAN-2003-1023
BID

Other resources

Debian Security Advisory DSA-424-1
http://www.debian.org/security/2004/dsa-424

RedHat Security Advisory RHSA-2004:034-03
https://rhn.redhat.com/errata/RHSA-2004-034.html

MandrakeSoft Security Advisory MDKSA-2004:010
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:010

Version history

Version Comments Date
1.0 Aviso emitido 2004-01-19
Ministerio de Defensa
CNI
CCN
CCN-CERT