首页 -> 安全研究

安全研究

安全漏洞
Gnu Ed 符号连接漏洞

发布日期:2000-12-12
更新日期:2000-12-12

受影响系统:

   Gnu Ed 2.19
    + RedHat Linux 7.0
    + RedHat Linux 6.0x
    + RedHat Linux 5.0
   Gnu Ed 2.18
    + Debian Linux 2.3
    + Debian Linux 2.2
   Gnu Ed 2.15
    + MandrakeSoft Linux Mandrake 7.2
    + MandrakeSoft Linux Mandrake 7.1
    + MandrakeSoft Linux Mandrake 7.0
    + MandrakeSoft Linux Mandrake 6.1
    + MandrakeSoft Linux Mandrake 6.0
不受影响系统:

   GNU Ed 2.18.1
    + Debian Linux 2.3
    + Debian Linux 2.2
   Gnu Ed 2.15.1
    + MandrakeSoft Linux Mandrake 7.2
    + MandrakeSoft Linux Mandrake 7.1
    + MandrakeSoft Linux Mandrake 7.0
    + MandrakeSoft Linux Mandrake 6.1
    + MandrakeSoft Linux Mandrake 6.0
描述:

GNU ed 是广泛发行的 linux/unix 上的文本编辑器。在它的
诸多版本中,存在一个漏洞。有报告说它在创建临时文件时使用
的方法不安全。除了前面所列的外,以前发行的版本也可能有这个
漏洞。

恰当地利用这个漏洞,恶意的本地用户可以成功实施符号连接
攻击覆盖任何文件,只要这些文件的属主是运行 ed 的用户,
或者是运行 ed 的用户对这些文件有写权限。


<* 来源:Alan Cox *>



建议:

临时解决办法:

  NSFOCUS建议您使用 Gnu Ed 2.15 版本,并下载这个版本的补丁。

厂商补丁:

[ redhat Linux ]
Red Hat Linux 5.2:

alpha:
ftp://updates.redhat.com/5.2/alpha/ed-0.2-19.5x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/ed-0.2-19.5x.alpha.rpm

sparc:
ftp://updates.redhat.com/5.2/sparc/ed-0.2-19.5x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/ed-0.2-19.5x.sparc.rpm

i386:
ftp://updates.redhat.com/5.2/i386/ed-0.2-19.5x.i386.rpm
ftp://updates.redhat.com/5.2/i386/ed-0.2-19.5x.i386.rpm

sources:
ftp://updates.redhat.com/5.2/SRPMS/ed-0.2-19.5x.src.rpm
ftp://updates.redhat.com/5.2/SRPMS/ed-0.2-19.5x.src.rpm

Red Hat Linux 6.0:

sparc:
ftp://updates.redhat.com/6.0/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.0/sparc/ed-0.2-19.6x.sparc.rpm

i386:
ftp://updates.redhat.com/6.0/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.0/i386/ed-0.2-19.6x.i386.rpm

alpha:
ftp://updates.redhat.com/6.0/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.0/alpha/ed-0.2-19.6x.alpha.rpm

sources:
ftp://updates.redhat.com/6.0/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.0/SRPMS/ed-0.2-19.6x.src.rpm

Red Hat Linux 6.1:

alpha:
ftp://updates.redhat.com/6.1/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.1/alpha/ed-0.2-19.6x.alpha.rpm

sparc:
ftp://updates.redhat.com/6.1/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.1/sparc/ed-0.2-19.6x.sparc.rpm

i386:
ftp://updates.redhat.com/6.1/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.1/i386/ed-0.2-19.6x.i386.rpm

sources:
ftp://updates.redhat.com/6.1/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.1/SRPMS/ed-0.2-19.6x.src.rpm

Red Hat Linux 6.2:

alpha:
ftp://updates.redhat.com/6.2/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/ed-0.2-19.6x.alpha.rpm

sparc:
ftp://updates.redhat.com/6.2/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/ed-0.2-19.6x.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/ed-0.2-19.6x.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.2/SRPMS/ed-0.2-19.6x.src.rpm

Red Hat Linux 7.0:

alpha:
ftp://updates.redhat.com/7.0/alpha/ed-0.2-19.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/i386/ed-0.2-19.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/ed-0.2-19.src.rpm

[ Linux-Mandrake ]

Linux-Mandrake 6.0:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.0/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.0/SRPMS/ed-0.2-15.1mdk.src.rpm

Linux-Mandrake 6.1:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.1/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.1/SRPMS/ed-0.2-15.1mdk.src.rpm

Linux-Mandrake 7.0:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.0/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.0/SRPMS/ed-0.2-15.1mdk.src.rpm

Linux-Mandrake 7.1:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.1/RPMS/ed-0.2-17.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.1/SRPMS/ed-0.2-17.1mdk.src.rpm

Linux-Mandrake 7.2:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.2/RPMS/ed-0.2-21.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.2/SRPMS/ed-0.2-21.1mdk.src.rpm



浏览次数:5729
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障