Executive Summary
Summary | |
---|---|
Title | New dietlibc packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-272 | First vendor Publication | 2003-03-28 |
Vendor | Debian | Last vendor Modification | 2003-03-28 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
eEye Digital Security discovered an integer overflow in the xdrmem_getbytes() function of glibc, that is also present in dietlibc, a small libc useful especially for small and embedded systems. This function is part of the XDR encoder/decoder derived from Sun's RPC implementation. Depending upon the application, this vulnerability can cause buffer overflows and could possibly be exploited to execute arbitray code. For the stable distribution (woody) this problem has been fixed in version 0.12-2.5. The old stable distribution (potato) does not contain dietlibc packages. For the unstable distribution (sid) this problem has been fixed in version 0.22-2. We recommend that you upgrade your dietlibc packages. |
Original Source
Url : http://www.debian.org/security/2003/dsa-272 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:230 | |||
Oval ID: | oval:org.mitre.oval:def:230 | ||
Title: | xdrmem_bytes() Integer Overflow Vulnerability | ||
Description: | Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0028 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | krb5 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 266-1 (krb5) File : nvt/deb_266_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 272-1 (dietlibc) File : nvt/deb_272_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 282-1 (glibc) File : nvt/deb_282_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
4501 | RPC XDR xdrmem_getbytes() Function Remote Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | portmap proxy integer overflow attempt TCP RuleID : 2093-community - Revision : 13 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt TCP RuleID : 2093 - Revision : 13 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt UDP RuleID : 2092-community - Revision : 14 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt UDP RuleID : 2092 - Revision : 14 - Type : PROTOCOL-RPC |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-266.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-272.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-282.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-037.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-043.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2003_027.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-052.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-090.nasl - Type : ACT_GATHER_INFO |
2003-03-19 | Name : Arbitrary code may be run on the remote server. File : rpc_xdrmem_bytes.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:01 |
|