BUGTRAQ ID: 24719
CVE(CAN) ID: CVE-2007-2835
unicon-imc2是Debian操作系统中所使用的中文输入法库。
unicon-imc2在使用环境变量数据时存在缓冲区溢出漏洞,本地攻击者可能利用此漏洞提升自己的权限。
unicon-imc2库没有安全地使用HOME环境变量,如果用户使用了链接到该函数库的应用程序的话就可能触发缓冲区溢出,导致以root用户权限执行任意指令。漏洞代码位于/unicon/ImmModules/cce/CCE_pinyin.c文件中:
static int
IMM_Flush ()
{
char name[256];
sprintf(name,"%s/.pyinput/usrphrase.tab",getenv("HOME"));
SaveUsrPhrase(name);
sprintf(name,"%s/.pyinput/sysfrequency.tab",getenv("HOME"));
SavePhraseFrequency(name);
return 1;
}
此外/unicon/ImmModules/cce/xl_pinyin.c文件中也存在类似问题。
Debian unicon-imc2 3.0.4
Debian
------
Debian已经为此发布了一个安全公告(DSA-1328-1)以及相应补丁:
DSA-1328-1:New unicon-imc2 packages fix buffer overflow
链接:<a href="http://www.debian.org/security/2007/dsa-1328" target="_blank">http://www.debian.org/security/2007/dsa-1328</a>
补丁下载:
Source archives:
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz</a>
Size/MD5 checksum: 14966 c3a081d69f9f81055de331690bf85e70
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz</a>
Size/MD5 checksum: 5704272 dfb8650debe038f85270b4ad60ad313b
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc</a>
Size/MD5 checksum: 603 711b8ba2894e03f257f7d6a74f526563
alpha architecture (DEC Alpha)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb</a>
Size/MD5 checksum: 4376642 8cfd1066d51dc11862115179be4ce4e4
amd64 architecture (AMD x86_64 (AMD64))
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb</a>
Size/MD5 checksum: 4362080 bad015c61850c9a4fe5d85edc77073fd
arm architecture (ARM)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb</a>
Size/MD5 checksum: 4152566 0d8b6a4a3bab316d49eea2211affea61
hppa architecture (HP PA RISC)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb</a>
Size/MD5 checksum: 4546634 dbdc37a0fb794ac2d806a1c960ff7c43
i386 architecture (Intel ia32)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb</a>
Size/MD5 checksum: 4153202 24ddede20e4b9ad3b15694275ad9d597
ia64 architecture (Intel ia64)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb</a>
Size/MD5 checksum: 4387184 c9494e9f38687b4cafb6b291942ddf6a
mipsel architecture (MIPS (Little Endian))
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb</a>
Size/MD5 checksum: 4159956 05c58cfe2805a3cd5a20171943e241c4
powerpc architecture (PowerPC)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb</a>
Size/MD5 checksum: 4516520 cb01b1bbc9bf724b7c6e97231945a964
s390 architecture (IBM S/390)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb</a>
Size/MD5 checksum: 4544838 7c2e4aa746330e0d94417a7254f03714
sparc architecture (Sun SPARC/UltraSPARC)
<a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb</a>
Size/MD5 checksum: 4501702 246893314e59799c4cabc3353fa8998f
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
暂无评论