发布日期:2009-07-28
更新日期:2009-07-29受影响系统:
Linux kernel 2.6.30.3
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 35851eCryptfs是Linux平台下的企业级加密文件系统。eCryptfs的密钥管理代码中的parse_tag_11_packet函数没有检查tag 11报文所包含的文字数据大小(tag11_contents_size)是否大于max_contents_bytes就作为内存参数将其拷贝到了大小为ECRYPTFS_SIG_SIZE的栈缓冲区中,这可能触发栈溢出漏洞。fs/ecryptfs/keystore.c
--
static int
parse_tag_11_packet(unsigned char *data, unsigned char *contents,
size_t max_contents_bytes, size_t *tag_11_contents_size,
size_t *packet_size, size_t max_packet_size)
{
size_t body_size;
size_t length_size;
int rc = 0; ... rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
&length_size);
if (rc) {
printk(KERN_WARNING "Invalid tag 11 packet format
");
goto out;
}
if (body_size < 14) {
printk(KERN_WARNING "Invalid body size ([%td])
", body_size);
rc = -EINVAL;
goto out;
}
(*packet_size) += length_size;
(*tag_11_contents_size) = (body_size - 14);
if (unlikely((*packet_size) + body_size + 1 > max_packet_size)) {
printk(KERN_ERR "Packet size exceeds max
");
rc = -EINVAL;
goto out;
}
if (data[(*packet_size)++] != 0x62) {
printk(KERN_WARNING "Unrecognizable packet
");
rc = -EINVAL;
goto out;
} ... (*packet_size) += 12; /* Ignore filename and modification date */
memcpy(contents, &data[(*packet_size)], (*tag_11_contents_size));
(*packet_size) += (*tag_11_contents_size); ...
--<*来源:Ramon de Carvalho Valle (ramon@risesecurity.org)
链接:http://marc.info/?l=bugtraq&m=124881445917700&w=2
*>建议:
--------------------------------------------------------------------------------
厂商补丁:Linux
-----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-14.35_all.deb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-14.37_all.deb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14_2.6.27-14.35_all.deb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14_2.6.27-14.37_all.deb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-14.35_all.deb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-14.37_all.debLinux eCryptfs工具parse_tag_3_packet()函数堆溢出漏洞Linux、Red Hat“赢”得Pwnie奖,绿坝提名相关资讯 Linux漏洞
- 敲击28次退格键之后:Linux漏洞可 (12/18/2015 11:22:28)
- Linux出现重大漏洞 GHOST ? (01/30/2015 18:35:07)
- Linux 2.6.31本地代码执行漏洞( (07/07/2014 07:51:17)
| - Red Hat Linux 修补“libuser”库 (07/26/2015 06:39:34)
- 红帽反驳:“Grinch(鬼精灵)”算 (12/30/2014 07:38:23)
- Linux gcc++漏洞:普通用户获得 (08/16/2013 11:57:41)
|
本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权
|