Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51233
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2002:167
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2002:167.

Updated glibc packages are available which fix a buffer overflow in the XDR
decoder and two vulnerabilities in the resolver functions.

[updated 8 aug 2002]
Updated packages have been made available, as the original errata introduced
a bug which could cause calloc() to crash on 32-bit platforms when passed a
size of 0. These updated errata packages contain a patch to correct this bug.

The glibc package contains standard libraries which are used by
multiple programs on the system. Sun RPC is a remote procedure call
framework which allows clients to invoke procedures in a server process
over a network. XDR is a mechanism for encoding data structures for use
with RPC. NFS, NIS, and other network services that are built upon Sun
RPC. The glibc package contains an XDR encoder/decoder derived from Sun's
RPC implementation which was recently demonstrated to be vulnerable to a
heap overflow.

An error in the calculation of memory needed for unpacking arrays in the
XDR decoder can result in a heap buffer overflow in glibc 2.2.5 and
earlier. Depending upon the application, this vulnerability may be
exploitable and could lead to arbitrary code execution. (CVE-2002-0391)

A buffer overflow vulnerability has been found in the way the glibc
resolver handles the resolution of network names and addresses via DNS (as
per Internet RFC 1011). Version 2.2.5 of glibc and earlier versions are
affected. A system would be vulnerable to this issue if the
'networks' database in the /etc/nsswitch.conf file includes the 'dns'
entry. By default, Red Hat Linux Advanced Server ships with 'networks'
set to 'files' and is therefore not vulnerable to this issue.
(CVE-2002-0684)

A related issue is a bug in the glibc-compat packages, which
provide compatibility for applications compiled against glibc version
2.0.x. Applications compiled against this version (such as those
distributed with early Red Hat Linux releases 5.0, 5.1, and 5.2) could also
be vulnerable to this issue. (CVE-2002-0651)

All users should upgrade to these errata packages which contain patches to
the glibc libraries and therefore are not vulnerable to these issues.

Thanks to Solar Designer for providing patches for this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2002-167.html
http://online.securityfocus.com/archive/1/285308
http://www.cert.org/advisories/CA-2002-19.html
http://sources.redhat.com/ml/libc-hacker/2002-08/msg00093.html

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2002-0684
Bugtraq: 20020704 Re: Remote buffer overflow in resolver code of libc (Google Search)
http://marc.info/?l=bugtraq&m=102581482511612&w=2
http://www.cert.org/advisories/CA-2002-19.html
CERT/CC vulnerability note: VU#542971
http://www.kb.cert.org/vuls/id/542971
Conectiva Linux advisory: CLSA-2002:507
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php
RedHat Security Advisories: RHSA-2002:139
http://rhn.redhat.com/errata/RHSA-2002-139.html
SuSE Security Announcement: SuSE-SA:2002:026 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2002-0391
AIX APAR: IY34194
http://archives.neohapsis.com/archives/aix/2002-q4/0002.html
BugTraq ID: 5356
http://www.securityfocus.com/bid/5356
Bugtraq: 20020731 Remote Buffer Overflow Vulnerability in Sun RPC (Google Search)
http://marc.info/?l=bugtraq&m=102813809232532&w=2
Bugtraq: 20020801 RPC analysis (Google Search)
http://marc.info/?l=bugtraq&m=102821785316087&w=2
Bugtraq: 20020802 MITKRB5-SA-2002-001: Remote root vulnerability in MIT krb5 admin (Google Search)
http://marc.info/?l=bugtraq&m=102831443208382&w=2
Bugtraq: 20020802 kerberos rpc xdr_array (Google Search)
http://online.securityfocus.com/archive/1/285740
Bugtraq: 20020803 OpenAFS Security Advisory 2002-001: Remote root vulnerability in OpenAFS servers (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html
Bugtraq: 20020909 GLSA: glibc (Google Search)
http://marc.info/?l=bugtraq&m=103158632831416&w=2
Caldera Security Advisory: CSSA-2002-055.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt
http://www.cert.org/advisories/CA-2002-25.html
CERT/CC vulnerability note: VU#192995
http://www.kb.cert.org/vuls/id/192995
Conectiva Linux advisory: CLA-2002:515
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515
Conectiva Linux advisory: CLA-2002:535
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535
Debian Security Information: DSA-142 (Google Search)
http://www.debian.org/security/2002/dsa-142
Debian Security Information: DSA-143 (Google Search)
http://www.debian.org/security/2002/dsa-143
Debian Security Information: DSA-146 (Google Search)
http://www.debian.org/security/2002/dsa-146
Debian Security Information: DSA-149 (Google Search)
http://www.debian.org/security/2002/dsa-149
Debian Security Information: DSA-333 (Google Search)
http://www.debian.org/security/2003/dsa-333
En Garde Linux Advisory: ESA-20021003-021
http://www.linuxsecurity.com/advisories/other_advisory-2399.html
FreeBSD Security Advisory: FreeBSD-SA-02:28
http://marc.info/?l=bugtraq&m=102821928418261&w=2
HPdes Security Advisory: HPSBTL0208-061
http://online.securityfocus.com/advisories/4402
HPdes Security Advisory: HPSBUX0209-215
http://archives.neohapsis.com/archives/hp/2002-q3/0077.html
ISS Security Advisory: 20020731 Remote Buffer Overflow Vulnerability in Sun RPC
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057
Microsoft Security Bulletin: MS02-057
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057
NETBSD Security Advisory: NetBSD-SA2002-011
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
RedHat Security Advisories: RHSA-2002:166
http://rhn.redhat.com/errata/RHSA-2002-166.html
http://www.redhat.com/support/errata/RHSA-2002-167.html
RedHat Security Advisories: RHSA-2002:172
http://rhn.redhat.com/errata/RHSA-2002-172.html
http://www.redhat.com/support/errata/RHSA-2002-173.html
http://www.redhat.com/support/errata/RHSA-2003-168.html
http://www.redhat.com/support/errata/RHSA-2003-212.html
SGI Security Advisory: 20020801-01-A
ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A
SGI Security Advisory: 20020801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P
SuSE Security Announcement: SuSE-SA:2002:031 (Google Search)
http://www.iss.net/security_center/static/9170.php
Common Vulnerability Exposure (CVE) ID: CVE-2002-0651
AIX APAR: IY32719
http://archives.neohapsis.com/archives/aix/2002-q3/0001.html
AIX APAR: IY32746
BugTraq ID: 5100
http://www.securityfocus.com/bid/5100
Bugtraq: 20020626 Remote buffer overflow in resolver code of libc (Google Search)
http://marc.info/?l=bugtraq&m=102513011311504&w=2
Bugtraq: 20020704 [OpenPKG-SA-2002.006] OpenPKG Security Advisory (bind) (Google Search)
http://marc.info/?l=bugtraq&m=102579743329251&w=2
Caldera Security Advisory: CSSA-2002-SCO.37
ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37
Caldera Security Advisory: CSSA-2002-SCO.39
ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39
CERT/CC vulnerability note: VU#803539
http://www.kb.cert.org/vuls/id/803539
En Garde Linux Advisory: ESA-20020724-018
http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html
http://marc.info/?l=bugtraq&m=102520962320134&w=2
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php
http://www.pine.nl/advisories/pine-cert-20020601.txt
NETBSD Security Advisory: NetBSD-SA2002-006
ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190
http://www.redhat.com/support/errata/RHSA-2002-119.html
http://www.redhat.com/support/errata/RHSA-2002-133.html
http://www.redhat.com/support/errata/RHSA-2003-154.html
SGI Security Advisory: 20020701-01-I
ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/
http://www.iss.net/security_center/static/9432.php
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.