首页 -> 安全研究
安全研究
安全漏洞
mICQ远程拒绝服务攻击漏洞
发布日期:2002-12-13
更新日期:2002-12-23
受影响系统:
Matthew Smith mICQ 0.4.9.4描述:
Matthew Smith mICQ 0.4.9.3
Matthew Smith mICQ 0.4.9.2b
Matthew Smith mICQ 0.4.6
Matthew Smith mICQ 0.4.3
Matthew Smith mICQ 0.4.9
- Debian Linux 3.0 alpha
- Debian Linux 3.0 IA-32
- Debian Linux 3.0 arm
- Debian Linux 3.0 powerpc
- Debian Linux 3.0 68k
- Debian Linux 3.0 i386
- Debian Linux 3.0 sparc
BUGTRAQ ID: 6392
CVE(CAN) ID: CVE-2002-1362
mICQ是一款基于文本的ICQ客户端。
mICQ在接收到不包含所需的0xFE操作符的ICQ消息时会导致崩溃,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
目前没有更详细的漏洞细节。
<*来源:Debian Security Advisory
链接:http://www.debian.org/security/2002/dsa-211
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-211-1)以及相应补丁:
DSA-211-1:New mICQ packages fix denial of service
链接:http://www.debian.org/security/2002/dsa-211
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc
Size/MD5 checksum: 518 f0f0475b6485a2ea29d11f122e48c56f
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz
Size/MD5 checksum: 3700 66f4327ddf4f1e5985b79f5a941269ba
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz
Size/MD5 checksum: 100430 ddc011d3509d593284bf9336e0a9f829
Alpha architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb
Size/MD5 checksum: 110916 f6d7fae1df9522eac47d8d294c98544e
ARM architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb
Size/MD5 checksum: 45934 ec658e43960c448350e7790cef2a9551
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb
Size/MD5 checksum: 42682 1ed0c823d4ccc05bc9e2070c15a687be
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb
Size/MD5 checksum: 38426 5ed0e53eb1076a8e842f9e97f9b12f03
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb
Size/MD5 checksum: 59664 bb34cef3e0160a1d348a411cdf992185
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb
Size/MD5 checksum: 60374 77ff9ef07e621f35bff70a08fb738e6b
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc
Size/MD5 checksum: 568 a17ef67f61fa309172c1d4736b43cbb1
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz
Size/MD5 checksum: 3474 ca9382767417889409ce844e1b246e32
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz
Size/MD5 checksum: 419381 16a71fce3abba8d9f731fe7bd761b4b8
Alpha architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb
Size/MD5 checksum: 324512 80015dffaa7e80871568ef89356da8f1
ARM architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb
Size/MD5 checksum: 295992 e03eba7bcff456cbc59c60b56424363f
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb
Size/MD5 checksum: 289546 017ff4e61aa4a5041b2a5d55de3b1d2d
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb
Size/MD5 checksum: 342760 53729a3a8c7c3531e88524291b510765
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb
Size/MD5 checksum: 306116 769de74fac901a4e0de33b2522c50df6
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb
Size/MD5 checksum: 281462 6ea6464fd8a0829a803736c6eb00aab1
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb
Size/MD5 checksum: 299342 569fd2cb03a89770f1922645aba043e5
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb
Size/MD5 checksum: 299074 3a4103196d6b55accea6b87a4fa8cfd0
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb
Size/MD5 checksum: 293460 17973866bb09bf293834e180c9ca43b6
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb
Size/MD5 checksum: 290830 bf88418e50e0aab6ea8388597f1cd287
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb
Size/MD5 checksum: 295562 3c6defaa7748b4a43fee112e347e5195
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
浏览次数:3022
严重程度:0(网友投票)
绿盟科技给您安全的保障