fib_semantics.c越界访问漏洞

admin 2023-12-13 06:35:37 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 fib_semantics.c越界访问漏洞

CVE编号

CVE-2007-2172

利用情况

暂无

补丁情况

官方补丁

披露时间

2007-04-23
漏洞描述
在2.6.21-Rc6之前的Linux内核2.6和2.4.35之前的2.4中,一个错误导致rta_max被用作数组大小而不是rtn_max,这将导致(1)DN_fib_props(DN_fi.c,decnet)和(2)fib_props(fib_emantics.c,ipv 4)函数&ldquo;越界访问&rdquo;。&nbsp;<br /> &nbsp;
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
http://rhn.redhat.com/errata/RHSA-2007-0488.html
http://secunia.com/advisories/25068
http://secunia.com/advisories/25288
http://secunia.com/advisories/25392
http://secunia.com/advisories/25838
http://secunia.com/advisories/26289
http://secunia.com/advisories/26450
http://secunia.com/advisories/26620
http://secunia.com/advisories/26647
http://secunia.com/advisories/27913
http://secunia.com/advisories/29058
http://secunia.com/advisories/33280
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
http://www.debian.org/security/2007/dsa-1356
http://www.debian.org/security/2007/dsa-1363
http://www.debian.org/security/2008/dsa-1503
http://www.debian.org/security/2008/dsa-1504
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
http://www.redhat.com/support/errata/RHSA-2007-0347.html
http://www.redhat.com/support/errata/RHSA-2007-1049.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.securityfocus.com/bid/23447
http://www.ubuntu.com/usn/usn-464-1
http://www.vupen.com/english/advisories/2007/2690
https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 canonical ubuntu_linux 6.06 -
运行在以下环境
系统 canonical ubuntu_linux 6.10 -
运行在以下环境
系统 canonical ubuntu_linux 7.04 -
运行在以下环境
系统 debian debian_linux 3.1 -
运行在以下环境
系统 debian debian_linux 4.0 -
运行在以下环境
系统 linux linux_kernel * From (including) 2.4.0 Up to (excluding) 2.4.35
运行在以下环境
系统 linux linux_kernel * From (including) 2.6.0 Up to (including) 2.6.20
运行在以下环境
系统 linux linux_kernel 2.6.21 -
运行在以下环境
系统 oracle_5 kernel * Up to (excluding) 2.6.18-8.1.4.0.1.el5
运行在以下环境
系统 redhat_5 kernel * Up to (excluding) 0:2.6.18-8.1.4.el5
阿里云评分 5.3
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0