首页 -> 安全研究

安全研究

安全漏洞
Noffle远程内存破坏漏洞

发布日期:2003-01-27
更新日期:2003-01-31

受影响系统:
Noffle Noffle 1.0.1
    - Debian Linux 3.0 i386
    - Debian Linux 3.0 68k
    - Debian Linux 3.0 powerpc
    - Debian Linux 3.0 arm
    - Debian Linux 3.0 IA-32
    - Debian Linux 3.0 alpha
    - Debian Linux 3.0 sparc
描述:
BUGTRAQ  ID: 6695
CVE(CAN) ID: CVE-2003-0037

noffle是一款开放源代码离线新闻服务程序。

noffle存在不明漏洞,远程攻击者可以利用这个漏洞以服务进程权限在系统上执行任意代码或进行拒绝服务攻击。

目前没有详细漏洞细节描述。

<*来源:Debian Security Advisory
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104368720729582&w=2
*>

建议:
厂商补丁:

Noffle
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Noffle Noffle 1.0.1:

Debian Upgrade noffle_1.0.1-1.1_alpha.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_alpha.deb

Debian Upgrade noffle_1.0.1-1.1_arm.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_arm.deb

Debian Upgrade noffle_1.0.1-1.1_i386.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_i386.deb

Debian Upgrade noffle_1.0.1-1.1_ia64.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_ia64.deb

Debian Upgrade noffle_1.0.1-1.1_hppa.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_hppa.deb

Debian Upgrade noffle_1.0.1-1.1_m68k.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_m68k.deb

Debian Upgrade noffle_1.0.1-1.1_mips.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_mips.deb

Debian Upgrade noffle_1.0.1-1.1_mipsel.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_mipsel.deb

Debian Upgrade noffle_1.0.1-1.1_powerpc.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_powerpc.deb

Debian Upgrade noffle_1.0.1-1.1_s390.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_s390.deb

Debian Upgrade noffle_1.0.1-1.1_sparc.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_sparc.deb

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:2772
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障