首页 -> 安全研究

安全研究

安全漏洞
mICQ远程拒绝服务攻击漏洞

发布日期:2002-12-13
更新日期:2002-12-23

受影响系统:
Matthew Smith mICQ 0.4.9.4
Matthew Smith mICQ 0.4.9.3
Matthew Smith mICQ 0.4.9.2b
Matthew Smith mICQ 0.4.6
Matthew Smith mICQ 0.4.3
Matthew Smith mICQ 0.4.9
    - Debian Linux 3.0 alpha
    - Debian Linux 3.0 IA-32
    - Debian Linux 3.0 arm
    - Debian Linux 3.0 powerpc
    - Debian Linux 3.0 68k
    - Debian Linux 3.0 i386
    - Debian Linux 3.0 sparc
描述:
BUGTRAQ  ID: 6392
CVE(CAN) ID: CVE-2002-1362

mICQ是一款基于文本的ICQ客户端。

mICQ在接收到不包含所需的0xFE操作符的ICQ消息时会导致崩溃,远程攻击者可以利用这个漏洞进行拒绝服务攻击。

目前没有更详细的漏洞细节。

<*来源:Debian Security Advisory
  
  链接:http://www.debian.org/security/2002/dsa-211
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-211-1)以及相应补丁:
DSA-211-1:New mICQ packages fix denial of service
链接:http://www.debian.org/security/2002/dsa-211

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.dsc
Size/MD5 checksum:      518 f0f0475b6485a2ea29d11f122e48c56f
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1.diff.gz
Size/MD5 checksum:     3700 66f4327ddf4f1e5985b79f5a941269ba
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3.orig.tar.gz
Size/MD5 checksum:   100430 ddc011d3509d593284bf9336e0a9f829

Alpha architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_alpha.deb
Size/MD5 checksum:   110916 f6d7fae1df9522eac47d8d294c98544e

ARM architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_arm.deb
Size/MD5 checksum:    45934 ec658e43960c448350e7790cef2a9551

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_i386.deb
Size/MD5 checksum:    42682 1ed0c823d4ccc05bc9e2070c15a687be

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_m68k.deb
Size/MD5 checksum:    38426 5ed0e53eb1076a8e842f9e97f9b12f03

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_powerpc.deb
Size/MD5 checksum:    59664 bb34cef3e0160a1d348a411cdf992185

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.3-4.1_sparc.deb
Size/MD5 checksum:    60374 77ff9ef07e621f35bff70a08fb738e6b


Debian GNU/Linux 3.0 alias woody
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.dsc
Size/MD5 checksum:      568 a17ef67f61fa309172c1d4736b43cbb1
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3.diff.gz
Size/MD5 checksum:     3474 ca9382767417889409ce844e1b246e32
http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9.orig.tar.gz
Size/MD5 checksum:   419381 16a71fce3abba8d9f731fe7bd761b4b8

Alpha architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_alpha.deb
Size/MD5 checksum:   324512 80015dffaa7e80871568ef89356da8f1

ARM architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_arm.deb
Size/MD5 checksum:   295992 e03eba7bcff456cbc59c60b56424363f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_i386.deb
Size/MD5 checksum:   289546 017ff4e61aa4a5041b2a5d55de3b1d2d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_ia64.deb
Size/MD5 checksum:   342760 53729a3a8c7c3531e88524291b510765

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_hppa.deb
Size/MD5 checksum:   306116 769de74fac901a4e0de33b2522c50df6

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_m68k.deb
Size/MD5 checksum:   281462 6ea6464fd8a0829a803736c6eb00aab1

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mips.deb
Size/MD5 checksum:   299342 569fd2cb03a89770f1922645aba043e5

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_mipsel.deb
Size/MD5 checksum:   299074 3a4103196d6b55accea6b87a4fa8cfd0

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_powerpc.deb
Size/MD5 checksum:   293460 17973866bb09bf293834e180c9ca43b6

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_s390.deb
Size/MD5 checksum:   290830 bf88418e50e0aab6ea8388597f1cd287

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/micq/micq_0.4.9-0woody3_sparc.deb
Size/MD5 checksum:   295562 3c6defaa7748b4a43fee112e347e5195

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:3022
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障