Boletines de Vulnerabilidades |
Desbordamiento de búfer local en LibAST |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Aumento de privilegios |
Dificultad | Principiante |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | LibAST |
Descripción |
|
Se ha descubierto una vulnerabilidad en Library of Assorted Spiffy Things (LibAST) 0.6.1 y anteriores. La vulnerabilidad reside en un desbordamiento de búfer en la función "conf_find_file()" del motor de configuración "conf.c". Un atacante local podría ejecutar código arbitrario con los privilegios del usuario "utmp" mediante un argumento "-X" especialmente diseñado. |
|
Solución |
|
Actualización de software Mandriva Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libast2-0.6.1-2.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libast2-devel-0.6.1-2.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/libast-0.6.1-2.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/lib64ast2-0.6.1-2.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/lib64ast2-devel-0.6.1-2.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/libast-0.6.1-2.1.20060mdk.src.rpm Debian Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.dsc http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.diff.gz http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_alpha.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_alpha.deb ARM http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_arm.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_i386.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_ia64.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_ia64.deb HP Precision http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_hppa.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_m68k.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mips.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mipsel.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_powerpc.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_s390.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_sparc.deb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_sparc.deb Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.dsc http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.tar.gz Alpha http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_alpha.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_amd64.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_arm.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_i386.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_ia64.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_hppa.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_m68k.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mips.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mipsel.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_powerpc.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_s390.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_sparc.deb http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2006-0224 |
BID | 16350 |
Recursos adicionales |
|
Mandriva Security Advisory (MDKSA-2006:029) http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:029 Debian Security Advisory (DSA 976-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00053.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2006-02-03 |
1.1 | Aviso emitido por Debian (DSA 976-1) | 2006-02-16 |