首页 -> 安全研究
安全研究
安全漏洞
Gnu Ed 符号连接漏洞
发布日期:2000-12-12
更新日期:2000-12-12
受影响系统:
不受影响系统:
Gnu Ed 2.19
+ RedHat Linux 7.0
+ RedHat Linux 6.0x
+ RedHat Linux 5.0
Gnu Ed 2.18
+ Debian Linux 2.3
+ Debian Linux 2.2
Gnu Ed 2.15
+ MandrakeSoft Linux Mandrake 7.2
+ MandrakeSoft Linux Mandrake 7.1
+ MandrakeSoft Linux Mandrake 7.0
+ MandrakeSoft Linux Mandrake 6.1
+ MandrakeSoft Linux Mandrake 6.0
描述:
GNU Ed 2.18.1
+ Debian Linux 2.3
+ Debian Linux 2.2
Gnu Ed 2.15.1
+ MandrakeSoft Linux Mandrake 7.2
+ MandrakeSoft Linux Mandrake 7.1
+ MandrakeSoft Linux Mandrake 7.0
+ MandrakeSoft Linux Mandrake 6.1
+ MandrakeSoft Linux Mandrake 6.0
GNU ed 是广泛发行的 linux/unix 上的文本编辑器。在它的
诸多版本中,存在一个漏洞。有报告说它在创建临时文件时使用
的方法不安全。除了前面所列的外,以前发行的版本也可能有这个
漏洞。
恰当地利用这个漏洞,恶意的本地用户可以成功实施符号连接
攻击覆盖任何文件,只要这些文件的属主是运行 ed 的用户,
或者是运行 ed 的用户对这些文件有写权限。
<* 来源:Alan Cox *>
建议:
临时解决办法:
NSFOCUS建议您使用 Gnu Ed 2.15 版本,并下载这个版本的补丁。
厂商补丁:
[ redhat Linux ]
Red Hat Linux 5.2:
alpha:
ftp://updates.redhat.com/5.2/alpha/ed-0.2-19.5x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/ed-0.2-19.5x.alpha.rpm
sparc:
ftp://updates.redhat.com/5.2/sparc/ed-0.2-19.5x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/ed-0.2-19.5x.sparc.rpm
i386:
ftp://updates.redhat.com/5.2/i386/ed-0.2-19.5x.i386.rpm
ftp://updates.redhat.com/5.2/i386/ed-0.2-19.5x.i386.rpm
sources:
ftp://updates.redhat.com/5.2/SRPMS/ed-0.2-19.5x.src.rpm
ftp://updates.redhat.com/5.2/SRPMS/ed-0.2-19.5x.src.rpm
Red Hat Linux 6.0:
sparc:
ftp://updates.redhat.com/6.0/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.0/sparc/ed-0.2-19.6x.sparc.rpm
i386:
ftp://updates.redhat.com/6.0/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.0/i386/ed-0.2-19.6x.i386.rpm
alpha:
ftp://updates.redhat.com/6.0/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.0/alpha/ed-0.2-19.6x.alpha.rpm
sources:
ftp://updates.redhat.com/6.0/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.0/SRPMS/ed-0.2-19.6x.src.rpm
Red Hat Linux 6.1:
alpha:
ftp://updates.redhat.com/6.1/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.1/alpha/ed-0.2-19.6x.alpha.rpm
sparc:
ftp://updates.redhat.com/6.1/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.1/sparc/ed-0.2-19.6x.sparc.rpm
i386:
ftp://updates.redhat.com/6.1/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.1/i386/ed-0.2-19.6x.i386.rpm
sources:
ftp://updates.redhat.com/6.1/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.1/SRPMS/ed-0.2-19.6x.src.rpm
Red Hat Linux 6.2:
alpha:
ftp://updates.redhat.com/6.2/alpha/ed-0.2-19.6x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/ed-0.2-19.6x.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/ed-0.2-19.6x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/ed-0.2-19.6x.sparc.rpm
i386:
ftp://updates.redhat.com/6.2/i386/ed-0.2-19.6x.i386.rpm
ftp://updates.redhat.com/6.2/i386/ed-0.2-19.6x.i386.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/ed-0.2-19.6x.src.rpm
ftp://updates.redhat.com/6.2/SRPMS/ed-0.2-19.6x.src.rpm
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/ed-0.2-19.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/i386/ed-0.2-19.i386.rpm
sources:
ftp://updates.redhat.com/7.0/SRPMS/ed-0.2-19.src.rpm
[ Linux-Mandrake ]
Linux-Mandrake 6.0:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.0/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.0/SRPMS/ed-0.2-15.1mdk.src.rpm
Linux-Mandrake 6.1:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.1/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/6.1/SRPMS/ed-0.2-15.1mdk.src.rpm
Linux-Mandrake 7.0:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.0/RPMS/ed-0.2-15.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.0/SRPMS/ed-0.2-15.1mdk.src.rpm
Linux-Mandrake 7.1:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.1/RPMS/ed-0.2-17.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.1/SRPMS/ed-0.2-17.1mdk.src.rpm
Linux-Mandrake 7.2:
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.2/RPMS/ed-0.2-21.1mdk.i586.rpm
http://sunsite.ualberta.ca/pub/Mirror/Linux/mandrake/7.2/SRPMS/ed-0.2-21.1mdk.src.rpm
浏览次数:5729
严重程度:0(网友投票)
绿盟科技给您安全的保障