首页 -> 安全研究
安全研究
安全漏洞
GNU GZip文档处理多个安全漏洞
发布日期:2006-09-19
更新日期:2006-11-28
受影响系统:
Debian Linux 3.1描述:
FreeBSD FreeBSD 6.1
FreeBSD FreeBSD 6.0
FreeBSD FreeBSD 5.5
FreeBSD FreeBSD 5.4
FreeBSD FreeBSD 5.3
FreeBSD FreeBSD 4.11
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux AS 2.1
GNU gzip 1.3.5
BUGTRAQ ID: 20101
CVE(CAN) ID: CVE-2006-4334,CVE-2006-4335,CVE-2006-4336,CVE-2006-4337,CVE-2006-4338
gzip是一款非常流行的文件压缩工具。
gzip解压文档文件的方式中存在多个安全漏洞,包括:
1) unlzh.c文件的make_table()函数中的漏洞允许用户修改某些栈数据,导致拒绝服务或执行任意代码;
2) unpack.c文件的build_tree()函数中存在缓冲区溢出漏洞。如果用户受骗打开了pack文档文件的话,就会导致拒绝服务或执行任意代码;
3) gzip的LZH支持的make_table()函数中存在缓冲区溢出。如果用户受骗解压了包含有特制解码表的文档的话,就会导致拒绝服务或执行任意代码;
4) huft_build()函数中的空指针引用和LZH处理中的死循环可能导致拒绝服务。
<*来源:Tavis Ormandy (taviso@gentoo.org)
链接:http://secunia.com/advisories/21996/
http://secunia.com/advisories/23153/
http://docs.info.apple.com/article.html?artnum=304829
http://secunia.com/advisories/23155/
http://lwn.net/Alerts/200049/?format=printable
http://www.debian.org/security/2006/dsa-1181
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc
http://security.gentoo.org/glsa/glsa-200611-24.xml
http://security.gentoo.org/glsa/glsa-200609-13.xml
http://www1.itrc.hp.com/service/cki/docDisplay.do?admit=-682735245+1162191057609+28353475&docId=c007
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
http://r.your.hp.com/r/c/r?2.1.HX.2XR.1M92gO.CeqE3m..T.EKCI.23NA.DLceEVR0
http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102766-1
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-1181-1)以及相应补丁:
DSA-1181-1:New gzip packages fix arbitrary code execution
链接:http://www.debian.org/security/2005/dsa-1181
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc
Size/MD5 checksum: 566 b4ef2a9e595a17f8596fdefb1f4b9bf6
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz
Size/MD5 checksum: 60478 cd1bec47a01d72c800f3bac85dfcc5f3
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz
Size/MD5 checksum: 331550 3d6c191dfd2bf307014b421c12dc8469
Alpha architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb
Size/MD5 checksum: 83740 450c8d78aa9654ab651ac21115834432
AMD64 architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb
Size/MD5 checksum: 75370 cf8896b90d00dc8fce58ab1e88149674
ARM architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb
Size/MD5 checksum: 76472 24b1723495120c89b9a1a55712fc557d
HP Precision architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb
Size/MD5 checksum: 79586 9a2d72859917de0f8b269ea95f392b2b
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb
Size/MD5 checksum: 71164 8267f1f753b0a2b380d149280b6e44bb
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb
Size/MD5 checksum: 91588 30b9aa547cfacc09cee832a9b7516b6e
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb
Size/MD5 checksum: 69110 cf17c8d59a6204c2dce1828f2b1f24c6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb
Size/MD5 checksum: 79488 e2242db1fb6e1c589a67658f96ba7f27
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb
Size/MD5 checksum: 79350 da63d665a88c29c6cf07b1ef3566ecd1
PowerPC architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb
Size/MD5 checksum: 76948 12e742fd43b8325e89f3b96e0cdd89a6
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb
Size/MD5 checksum: 77540 0e75950ede6c45a332eead6d71b7e7a2
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb
Size/MD5 checksum: 74654 471feed410766674a72327e58702febd
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
FreeBSD
-------
FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-06:21)以及相应补丁:
FreeBSD-SA-06:21:Multiple vulnerabilities in gzip
链接:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc
补丁下载:
执行以下步骤之一:
1) 将有漏洞的系统升级到4-STABLE, 5-STABLE或6-STABLE,或修改日期之后的RELENG_6_1,
RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3或RELENG_4_11安全版本.
2) 为当前系统打补丁:
以下补丁确认可应用于FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0和6.1系统.
a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名.
# fetch http://security.FreeBSD.org/patches/SA-06:21/gzip.patch
# fetch http://security.FreeBSD.org/patches/SA-06:21/gzip.patch.asc
b) 以root执行以下命令:
# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/gnu/usr.bin/gzip
# make obj && make depend && make && make install
HP
--
HP已经为此发布了一个安全公告(HPSBTU02168)以及相应补丁:
HPSBTU02168:SSRT061237 rev.1 - HP Tru64 UNIX Running gzip, gunzip, and gzcat, Remote Unauthorized Arbitrary Code Execution or Denial of Service (DoS)
链接:http://www1.itrc.hp.com/service/cki/docDisplay.do?admit=-682735245+1162191057609+28353475&docId=c007
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2006:0667-01)以及相应补丁:
RHSA-2006:0667-01:Moderate: gzip security update
链接:http://lwn.net/Alerts/200049/?format=printable
SGI
---
SGI已经为此发布了一个安全公告(20061001-01-P)以及相应补丁:
20061001-01-P:SGI Advanced Linux Environment 3 Security Update #64
链接:ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Sun
---
Sun已经为此发布了一个安全公告(Sun-Alert-102766)以及相应补丁:
Sun-Alert-102766:Multiple Security Vulnerabilities in the gzip(1) Command May Lead to Denial of Service (DoS) or Execution of Arbitrary Code
链接:http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102766-1
Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200609-13)以及相应补丁:
GLSA-200609-13:gzip: Multiple vulnerabilities
链接:http://security.gentoo.org/glsa/glsa-200609-13.xml
浏览次数:4144
严重程度:21(网友投票)
绿盟科技给您安全的保障