首页 -> 安全研究

安全研究

安全漏洞
EKG未明漏洞执行漏洞

发布日期:2005-07-19
更新日期:2005-07-20

受影响系统:
EKG EKG 2005-04-11
    - Debian Linux 3.1
描述:
BUGTRAQ  ID: 14293
CVE(CAN) ID: CVE-2005-1851

Eksperymentalny Klient Gadu-Gadu(EKG)是一款支持Gadu-Gadu的通信客户端程序。

EKG中存在细节未明的命令执行漏洞,成功利用这个漏洞可能导致以应用程序的环境执行shell命令。

<*来源:Martin Schulze (joey@infodrom.org
        Wojtek Kaniewski
  
  链接:http://www.debian.org/security/2005/dsa-760
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-760-1)以及相应补丁:
DSA-760-1:New ekg packages fix several vulnerabilities
链接:http://www.debian.org/security/2005/dsa-760

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4.dsc
Size/MD5 checksum:      755 afa73f3af76f74355574c130ba76d461
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4.diff.gz
Size/MD5 checksum:    40957 385352563d78e23c0ba637d9ad504315
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411.orig.tar.gz
Size/MD5 checksum:   495079 bc246779de6f6c97f289e60b60db6c14

Alpha architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_alpha.deb
Size/MD5 checksum:   310804 35d7c8cbf8a12901b9d40fe9b0f6afb0
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_alpha.deb
Size/MD5 checksum:   151072 fe52ee0e5b5178b354cf1215a1c70797
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_alpha.deb
Size/MD5 checksum:    69360 d4076333e7a8ea9ea030ee74b949268d

ARM architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_arm.deb
Size/MD5 checksum:   267786 b6d7d7cee20a21b908970f38bb568ad3
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_arm.deb
Size/MD5 checksum:   129136 8ce65bb7f665b77ab34b337a2fde411a
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_arm.deb
Size/MD5 checksum:    62250 b54df9bcb8a054d17edcd9a46aba4f1a

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_i386.deb
Size/MD5 checksum:   270560 d7da9425b12bade210092332eb4ead24
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_i386.deb
Size/MD5 checksum:   126152 b9f5a0c2c12f9b3e62242d1e8bd2f2ef
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_i386.deb
Size/MD5 checksum:    63260 9f7cee9a3edcf0bdeabdd604f4db9e8b

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_ia64.deb
Size/MD5 checksum:   355198 9f1aa917338fd9f82fe25c3b79d81cb6
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_ia64.deb
Size/MD5 checksum:   150008 4a795a0f7f5ee180eeadd396b94f7a8c
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_ia64.deb
Size/MD5 checksum:    79918 fcf1dc826c929f6ed7b064bc1eabe0f0

HP Precision architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_hppa.deb
Size/MD5 checksum:   287906 0ec525527f56e0024394f3ec4b94ca9e
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_hppa.deb
Size/MD5 checksum:   135454 b8f890184a99fdebaa7fa6fb45edbe88
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_hppa.deb
Size/MD5 checksum:    68776 97e1579e479f6079efa4ca9437e11048

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_m68k.deb
Size/MD5 checksum:   248558 265300b483f1ccb46933d35590ebeb4e
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_m68k.deb
Size/MD5 checksum:   121620 7d367ffda93603c7efbb3e318dafcd80
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_m68k.deb
Size/MD5 checksum:    61862 4a46b3bc96f5a4504573d14434f39ace

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_mips.deb
Size/MD5 checksum:   280752 ec0bde8528d052a57bf790fa3c668bce
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_mips.deb
Size/MD5 checksum:   131864 a2bfe75adc1f9e64d017b736e0b73e85
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_mips.deb
Size/MD5 checksum:    61666 fddfdd1c6f69b7594d1912571c3c1f6f

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_mipsel.deb
Size/MD5 checksum:   280416 180f2466a931ad0e8aa41bc026a3ebf8
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_mipsel.deb
Size/MD5 checksum:   131848 e3050e9504665b1732fe32f1e38f236f
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_mipsel.deb
Size/MD5 checksum:    61666 6342defe0f25bace47bed4ed21023f17

PowerPC architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_powerpc.deb
Size/MD5 checksum:   280532 c8cd83e7a1810c202c795dc72759f3e6
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_powerpc.deb
Size/MD5 checksum:   131524 c60af9fcc06d88bca764dd9cdf80b722
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_powerpc.deb
Size/MD5 checksum:    65636 b5f436a764e7556075ec241da72fb457

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_s390.deb
Size/MD5 checksum:   279018 96b787165549cdb9eb1d148c63752656
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_s390.deb
Size/MD5 checksum:   128726 5be20aa3b72856ad6f17835ff8e25e56
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_s390.deb
Size/MD5 checksum:    64164 4548c97ed8ed104301c63f9dc528c74e

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-4_sparc.deb
Size/MD5 checksum:   269416 b096a73c10c7ef0386dc27a89aad30e7
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-4_sparc.deb
Size/MD5 checksum:   128084 b74cc91e48e91e2b0c117a9fd897059d
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-4_sparc.deb
Size/MD5 checksum:    64176 a49f36139775619d597c8afd1132c3eb

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:3013
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障