int(1599)

Vulnerability Bulletins


Desbordamiento de búfer en Convert-Uulib

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Convert-UUlib <1.051

Description

Se ha descubierto una vulnerabilidad de desbordamiento de búfer en las versiones anteriores a la 1.051 de Convert-UUlib, una interfaz en Perl para la librería uulib. La vulnerabilidad reside en determinadas operaciones de lectura.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario mediante una aplicación que utilice la interfaz vulnerable.

Solution

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de software

Convert-UUlib
Convert-UUlib 1.051
http://search.cpan.org/dist/Convert-UUlib/

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1.dsc
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1.diff.gz
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_alpha.deb
ARM
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/libc/libconvert-uulib-perl/libconvert-uulib-perl_0.201-2woody1_sparc.deb

SUSE Linux
Actualizar mediante YaST Online Update

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/perl-Convert-UUlib-1.051-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/perl-Convert-UUlib-1.051-0.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/perl-Convert-UUlib-1.051-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/perl-Convert-UUlib-1.051-0.1.C30mdk.src.rpm

Mandrivalinux LE2005
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/perl-Convert-UUlib-1.051-0.1.102mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/perl-Convert-UUlib-1.051-0.1.102mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/perl-Convert-UUlib-1.051-0.1.102mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/perl-Convert-UUlib-1.051-0.1.102mdk.src.rpm

Standar resources

Property Value
CVE CAN-2005-1349
BID

Other resources

Debian Security Advisory DSA 727-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00110.html

SUSE Security Summary Report SUSE-SR:2005:014
http://www.novell.com/linux/security/advisories/2005_14_sr.html

Mandriva Security Advisory (MDKSA-2006:022)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:022

Version history

Version Comments Date
1.0 Aviso emitido 2005-05-23
1.1 Aviso emitido por SUSE (SUSE-SR:2005:014) 2005-06-08
1.2 Aviso emitido por Mandriva (MDKSA-2006:022) 2006-01-30
Ministerio de Defensa
CNI
CCN
CCN-CERT