- CNNVD編號(hào):CNNVD-200706-380
- 危害等級(jí): 超危
- CVE編號(hào):CVE-2007-3338
- 漏洞類型: 緩沖區(qū)溢出
- 威脅類型:遠(yuǎn)程
- 廠 商:ingres
- 漏洞來(lái)源: iDEFENSEChris Anle...
- 發(fā)布時(shí)間:2007-06-22
- 更新時(shí)間:2020-12-11
漏洞簡(jiǎn)介
Ingres是很多CA產(chǎn)品默認(rèn)所使用的數(shù)據(jù)庫(kù)后端。
Ingres SQL函數(shù)uuid_from_char()可從UUID的字符串表示創(chuàng)建UUID,例如:
select uuid_from_char(\'\'11111111-2222-3333-4444-555555555555\'\')
如果向uuid_from_char傳送了超長(zhǎng)字符串參數(shù),就可能溢出棧緩沖區(qū),覆蓋保存的返回地址,將執(zhí)行路徑重新定向到攻擊者所選擇的地址。
Ingres verifydb工具可以解析duveutil.c文件duve_get_args函數(shù)中的命令行參數(shù)。如果傳送了以下形式的參數(shù):
-dbms_testAAAAAAAAAAAAAA...<很多A>
就會(huì)導(dǎo)致執(zhí)行以下代碼:
case \'\'d\'\': /* debug flag - should be 1st parameter */
if (MEcmp((PTR)argv[parmno], (PTR)\"-dbms_test\", (u_i2)10)
==DU_IDENTICAL )
{
char numbuf[100]; /* scratch pad to read in number*/
/* the DBMS_TEST flag was specified. See if a numeric
** value was attached to it. If so, convert to decimal.
*/
if (argv[parmno][10])
{
STcopy ( &argv[parmno][10], numbuf);
cv_numbuf(numbuf, &duve_cb->duve_dbms_test);
}
else
duve_cb->duve_dbms_test = -1;
}
else
duve_cb->duve_debug = TRUE;
break;
Ingres沒(méi)有執(zhí)行長(zhǎng)度檢查便使用STcopy函數(shù)將-dbms_test字符串后的參數(shù)數(shù)據(jù)拷貝到了numbuf緩沖區(qū),這導(dǎo)致覆蓋棧中的變量,包括所保存的返回地址。
漏洞公示
目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)這個(gè)安全問(wèn)題,補(bǔ)丁下載鏈接:
Ingres Corporation
------------------
參考網(wǎng)站
來(lái)源: supportconnectw.ca.com
鏈接:http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp
來(lái)源: XF
名稱: ingres-duvegetargs-bo(34998)
鏈接:http://xforce.iss.net/xforce/xfdb/34998
來(lái)源: XF
名稱: ingres-uuidfromchar-bo(34995)
鏈接:http://xforce.iss.net/xforce/xfdb/34995
來(lái)源: BID
名稱: 24585
鏈接:http://www.securityfocus.com/bid/24585
來(lái)源: BUGTRAQ
名稱: 20070625 Ingres stack overflow in uuid_from_char function
鏈接:http://www.securityfocus.com/archive/1/archive/1/472197/100/0/threaded
來(lái)源: BUGTRAQ
名稱: 20070625 Ingres verifydb local stack overflow
鏈接:http://www.securityfocus.com/archive/1/archive/1/472194/100/0/threaded
來(lái)源: MISC
鏈接:http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-stack-overflow/
來(lái)源: MISC
鏈接:http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-ingres-stack-overflow/
來(lái)源: VUPEN
名稱: ADV-2007-2290
鏈接:http://www.frsirt.com/english/advisories/2007/2290
來(lái)源: VUPEN
名稱: ADV-2007-2288
鏈接:http://www.frsirt.com/english/advisories/2007/2288
來(lái)源: www.ca.com
鏈接:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778
來(lái)源: SECUNIA
名稱: 25775
鏈接:http://secunia.com/advisories/25775
來(lái)源: SECUNIA
名稱: 25756