📄 deb_379_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 379-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53374); script_cve_id("CVE-2003-0773", "CVE-2003-0774", "CVE-2003-0775", "CVE-2003-0776", "CVE-2003-0777", "CVE-2003-0778"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 379-1 (sane-backends)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to sane-backendsannounced via advisory DSA 379-1.Alexander Hvostov, Julien Blache and Aurelien Jarno discovered severalsecurity-related problems in the sane-backends package, which containsan API library for scanners including a scanning daemon (in thepackage libsane) that can be remotely exploited. Thes problems allowa remote attacker to cause a segfault fault and/or consume arbitraryamounts of memory. The attack is successful, even if the attacker'scomputer isn't listed in saned.conf.You are only vulnerable if you actually run saned e.g. in xinetd orinetd. If the entries in the configuration file of xinetd or inetdrespectively are commented out or do not exist, you are safe.Try telnet localhost 6566 on the server that may run saned. If youget connection refused saned is not running and you are safe.The Common Vulnerabilities and Exposures project identifies thefollowing problems:CVE-2003-0773:saned checks the identity (IP address) of the remote host onlyafter the first communication took place (SANE_NET_INIT). Soeveryone can send that RPC, even if the remote host is not allowedto scan (not listed in saned.conf).CVE-2003-0774:saned lacks error checking nearly everywhere in the code. Soconnection drops are detected very late. If the drop of theconnection isn't detected, the access to the internal wire bufferleaves the limits of the allocated memory. So random memory afterthe wire buffer is read which will be followed by a segmentationfault.CVE-2003-0775:If saned expects strings, it mallocs the memory necessary to storethe complete string after it receives the size of the string. Ifthe connection was dropped before transmitting the size, mallocwill reserve an arbitrary size of memory. Depending on that sizeand the amount of memory available either malloc fails (->sanedquits nicely) or a huge amount of memory is allocated. Swapping andand OOM measures may occur depending on the kernel.CVE-2003-0776:saned doesn't check the validity of the RPC numbers it gets beforegetting the parameters.CVE-2003-0777:If debug messages are enabled and a connection is dropped,non-null-terminated strings may be printed and segamentation faultsmay occur.CVE-2003-0778:It's possible to allocate an arbitrary amount of memory on theserver running saned even if the connection isn't dropped. At themoment this can not easily be fixed according to the author.Better limit the total amount of memory saned may use (ulimit).For the stable distribution (woody) this problem has beenfixed in version 1.0.7-4.For the unstable distribution (sid) this problem has been fixed inversion 1.0.11-1 and later.We recommend that you upgrade your libsane packages.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20379-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 379-1 (sane-backends)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"libsane", ver:"1.0.7-4", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"libsane-dev", ver:"1.0.7-4", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -