int(1858)

Vulnerability Bulletins


Múltiples desbordamientos de búfer en gopher

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software gopher 3.0.9

Description

Se han descubierto múltiples desbordamientos de búfer en el cliente gopher 3.0.9. La vulnerabilidad reside en que las funciones "VIfromLine" y "FIOgetargv" no manejan correctamente algunos argumentos.

Un atacante remoto podría ejecutar código arbitrario mediante un servidor gopher especialmente diseñado.

Solution



Actualización de software

Debian

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4.dsc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4.tar.gz
Alpha
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_alpha.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_alpha.deb
ARM
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_arm.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_i386.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_ia64.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_hppa.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_m68k.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_mips.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_mipsel.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_powerpc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_s390.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_sparc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_sparc.deb

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2.dsc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2.tar.gz
Alpha
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_amd64.deb
ARM
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_sparc.deb

Standar resources

Property Value
CVE CAN-2005-2772
BID

Other resources

Debian Security Advisory (DSA 832-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00225.html

Version history

Version Comments Date
1.0 Aviso emitido 2005-10-07
Ministerio de Defensa
CNI
CCN
CCN-CERT