安全研究
安全漏洞
Noffle远程内存破坏漏洞
发布日期:2003-01-27
更新日期:2003-01-31
受影响系统:
Noffle Noffle 1.0.1描述:
- Debian Linux 3.0 i386
- Debian Linux 3.0 68k
- Debian Linux 3.0 powerpc
- Debian Linux 3.0 arm
- Debian Linux 3.0 IA-32
- Debian Linux 3.0 alpha
- Debian Linux 3.0 sparc
BUGTRAQ ID: 6695
CVE(CAN) ID: CVE-2003-0037
noffle是一款开放源代码离线新闻服务程序。
noffle存在不明漏洞,远程攻击者可以利用这个漏洞以服务进程权限在系统上执行任意代码或进行拒绝服务攻击。
目前没有详细漏洞细节描述。
<*来源:Debian Security Advisory
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104368720729582&w=2
*>
建议:
厂商补丁:
Noffle
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
Noffle Noffle 1.0.1:
Debian Upgrade noffle_1.0.1-1.1_alpha.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_alpha.deb
Debian Upgrade noffle_1.0.1-1.1_arm.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_arm.deb
Debian Upgrade noffle_1.0.1-1.1_i386.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_i386.deb
Debian Upgrade noffle_1.0.1-1.1_ia64.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_ia64.deb
Debian Upgrade noffle_1.0.1-1.1_hppa.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_hppa.deb
Debian Upgrade noffle_1.0.1-1.1_m68k.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_m68k.deb
Debian Upgrade noffle_1.0.1-1.1_mips.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_mips.deb
Debian Upgrade noffle_1.0.1-1.1_mipsel.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_mipsel.deb
Debian Upgrade noffle_1.0.1-1.1_powerpc.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_powerpc.deb
Debian Upgrade noffle_1.0.1-1.1_s390.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_s390.deb
Debian Upgrade noffle_1.0.1-1.1_sparc.deb
http://security.debian.org/pool/updates/main/n/noffle/noffle_1.0.1-1.1_sparc.deb
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
浏览次数:2794
严重程度:0(网友投票)
绿盟科技给您安全的保障