首页 -> 安全研究

安全研究

安全漏洞
Red Hat关于NFS的安全公告

发布日期:1999-11-20
更新日期:1999-11-20

受影响系统:
Red Hat Linux 4.x, all platforms
Red Hat Linux 5.x, all platforms
不受影响系统:
Red Hat Linux 6.x 使用knfsd kernel space NFS daemon所以不存在此问题。

描述:
Red Hat Linux 4.2 and 5.2在用户NFS进程中存在缓存溢出问题。

在移动目录的时候没有检查路径名的长度。如果创建一个足够长的目录名,处理目录名的缓存将溢
出,造成可以以运行NFS服务用户(root)的身份执行任意代码。执行这个溢出需要在服务器上的共享部分有读/写权限。


建议:
Red Hat Linux 4.2 和 5.2用户使用升级软件包。

可以用下面的命令安装补丁包:
rpm -Uvh

where filename is the name of the RPM.

5. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info):

6. Obsoleted by:

7. Conflicts with:

8. RPMs required:

Red Hat Linux 4.x:

Intel:
ftp://updates.redhat.com/4.2/i386/nfs-server-2.2beta47-0.i386.rpm
ftp://updates.redhat.com/4.2/i386/nfs-server-clients-2.2beta47-0.i386.rpm

Alpha:
ftp://updates.redhat.com/4.2/alpha/nfs-server-2.2beta47-0.alpha.rpm
ftp://updates.redhat.com/4.2/alpha/nfs-server-clients-2.2beta47-0.alpha.rpm

Sparc:
ftp://updates.redhat.com/4.2/sparc/nfs-server-2.2beta47-0.sparc.rpm
ftp://updates.redhat.com/4.2/sparc/nfs-server-clients-2.2beta47-0.sparc.rpm

Source packages:
ftp://updates.redhat.com/4.2/SRPMS/nfs-server-2.2beta47-0.src.rpm

Red Hat Linux 5.x:

Intel:
ftp://updates.redhat.com/5.2/i386/nfs-server-2.2beta47-1.i386.rpm
ftp://updates.redhat.com/5.2/i386/nfs-server-clients-2.2beta47-1.i386.rpm

Alpha:
ftp://updates.redhat.com/5.2/alpha/nfs-server-2.2beta47-1.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/nfs-server-clients-2.2beta47-1.alpha.rpm

Sparc:
ftp://updates.redhat.com/5.2/sparc/nfs-server-2.2beta47-1.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/nfs-server-clients-2.2beta47-1.sparc.rpm

Source packages:
ftp://updates.redhat.com/5.2/SRPMS/nfs-server-2.2beta47-1.src.rpm

9. 确认:

MD5 sum Package Name
--------------------------------------------------------------------------
09b6c7ff370f58140aac7d1a41b50035 i386/nfs-server-2.2beta47-0.i386.rpm
14e1e5e5bcba01f9bb9cb6dfe9e2627e i386/nfs-server-clients-2.2beta47-0.i386.rpm
9ce6b7afd8ef5a1d5b481ee9fe2530d3 alpha/nfs-server-2.2beta47-0.alpha.rpm
6306ba518cd64b0d018b8b2786ecb128 alpha/nfs-server-clients-2.2beta47-0.alpha.rpm
cf15f95dd9b13844b63a9e7607a873ee sparc/nfs-server-2.2beta47-0.sparc.rpm
a450ee5b850fb6ed906b3527a2165ec5 sparc/nfs-server-clients-2.2beta47-0.sparc.rpm
e6ffef85c75620ebebf0c3244a181c46 SRPMS/nfs-server-2.2beta47-0.src.rpm

1d408903070fa5313072fe8886917bda i386/nfs-server-2.2beta47-1.i386.rpm
e4c30ae30f3cbdd4ff2cd90232c46e0e i386/nfs-server-clients-2.2beta47-1.i386.rpm
1d6f0a6c28b4cb20e1f203bb8d376af1 alpha/nfs-server-2.2beta47-1.alpha.rpm
75f89bcd51df6771d993aaee6f812ce7 alpha/nfs-server-clients-2.2beta47-1.alpha.rpm
0dc37d253e7620ce300ef51b15af562b sparc/nfs-server-2.2beta47-1.sparc.rpm
21c743b1631db675dd1aac7007c9a37a sparc/nfs-server-clients-2.2beta47-1.sparc.rpm
810ca1bd9d362031ed21c664eb2024ac SRPMS/nfs-server-2.2beta47-1.src.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg


浏览次数:7393
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障