Ingress數(shù)據(jù)庫(kù)服務(wù)器Data Access Server組件遠(yuǎn)程棧溢出漏洞
  • CNNVD編號(hào):CNNVD-200706-380
  • 危害等級(jí): 超危 
  • CVE編號(hào):CVE-2007-3338
  • 漏洞類型: 緩沖區(qū)溢出
  • 威脅類型:遠(yuǎn)程
  • 廠       商:ingres
  • 漏洞來(lái)源: iDEFENSEChris Anle...
  • 發(fā)布時(shí)間:2007-06-22
  • 更新時(shí)間:2020-12-11

漏洞簡(jiǎn)介

Ingres是很多CA產(chǎn)品默認(rèn)所使用的數(shù)據(jù)庫(kù)后端。

Ingres SQL函數(shù)uuid_from_char()可從UUID的字符串表示創(chuàng)建UUID,例如:

select uuid_from_char(\'\'11111111-2222-3333-4444-555555555555\'\')

如果向uuid_from_char傳送了超長(zhǎng)字符串參數(shù),就可能溢出棧緩沖區(qū),覆蓋保存的返回地址,將執(zhí)行路徑重新定向到攻擊者所選擇的地址。

Ingres verifydb工具可以解析duveutil.c文件duve_get_args函數(shù)中的命令行參數(shù)。如果傳送了以下形式的參數(shù):

-dbms_testAAAAAAAAAAAAAA...<很多A>

就會(huì)導(dǎo)致執(zhí)行以下代碼:

case \'\'d\'\': /* debug flag - should be 1st parameter */

if (MEcmp((PTR)argv[parmno], (PTR)\"-dbms_test\", (u_i2)10)

==DU_IDENTICAL )

{

char numbuf[100]; /* scratch pad to read in number*/

/* the DBMS_TEST flag was specified. See if a numeric

** value was attached to it. If so, convert to decimal.

*/

if (argv[parmno][10])

{

STcopy ( &argv[parmno][10], numbuf);

cv_numbuf(numbuf, &duve_cb->duve_dbms_test);

}

else

duve_cb->duve_dbms_test = -1;

}

else

duve_cb->duve_debug = TRUE;

break;

Ingres沒(méi)有執(zhí)行長(zhǎng)度檢查便使用STcopy函數(shù)將-dbms_test字符串后的參數(shù)數(shù)據(jù)拷貝到了numbuf緩沖區(qū),這導(dǎo)致覆蓋棧中的變量,包括所保存的返回地址。

漏洞公示

目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)這個(gè)安全問(wèn)題,補(bǔ)丁下載鏈接:

Ingres Corporation

------------------

http://www.ingres.com/index.php

參考網(wǎng)站

來(lái)源: supportconnectw.ca.com

鏈接:http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp


來(lái)源: XF

名稱: ingres-duvegetargs-bo(34998)

鏈接:http://xforce.iss.net/xforce/xfdb/34998


來(lái)源: XF

名稱: ingres-uuidfromchar-bo(34995)

鏈接:http://xforce.iss.net/xforce/xfdb/34995


來(lái)源: BID

名稱: 24585

鏈接:http://www.securityfocus.com/bid/24585


來(lái)源: BUGTRAQ

名稱: 20070625 Ingres stack overflow in uuid_from_char function

鏈接:http://www.securityfocus.com/archive/1/archive/1/472197/100/0/threaded


來(lái)源: BUGTRAQ

名稱: 20070625 Ingres verifydb local stack overflow

鏈接:http://www.securityfocus.com/archive/1/archive/1/472194/100/0/threaded


來(lái)源: MISC

鏈接:http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-stack-overflow/


來(lái)源: MISC

鏈接:http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-ingres-stack-overflow/


來(lái)源: VUPEN

名稱: ADV-2007-2290

鏈接:http://www.frsirt.com/english/advisories/2007/2290


來(lái)源: VUPEN

名稱: ADV-2007-2288

鏈接:http://www.frsirt.com/english/advisories/2007/2288


來(lái)源: www.ca.com

鏈接:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778


來(lái)源: SECUNIA

名稱: 25775

鏈接:http://secunia.com/advisories/25775


來(lái)源: SECUNIA

名稱: 25756

鏈接:http://secunia.com/advisories/25756

補(bǔ)丁

暫無(wú)