heartbeat 缓冲区溢出代码执行漏洞

admin 2023-11-25 00:46:21 Ali_highrisk 来源:ZONE.CI 全球网 0 阅读模式
高危 heartbeat 缓冲区溢出代码执行漏洞

CVE编号

CVE-2002-1215

利用情况

暂无

补丁情况

官方补丁

披露时间

2002-10-28
漏洞描述
heartbeat 0.4.9及更早版本中的多个格式字符串漏洞(在某些源中声明为缓冲区溢出)允许远程攻击者通过某些到UDP端口694的数据包执行任意代码(在某些源中错误地声明为TCP)。
解决建议
Debian------Debian已经为此发布了一个安全公告(DSA-174-1)以及相应补丁:DSA-174-1:New heartbeat packages fix buffer overflows链接:http://www.debian.org/security/2002/dsa-174补丁下载:Source archives:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2.dscSize/MD5 checksum: 658 4e8837e9eb95922aa5afc247a494db5fhttp://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2.diff.gzSize/MD5 checksum: 46755 411725a4fd7aa7eef881cf51ba1a8cfbhttp://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l.orig.tar.gzSize/MD5 checksum: 308033 1dcae9e87ad2e5c2113e91a884c1ca8eArchitecture independent components:http://security.debian.org/pool/updates/main/h/heartbeat/ldirectord_0.4.9.0l-7.2_all.debSize/MD5 checksum: 33118 27d3073cade1d823e0405755b9b4ebd1Alpha architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_alpha.debSize/MD5 checksum: 207742 bad9f314f54f855aca65766778a6c0b6http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_alpha.debSize/MD5 checksum: 15444 461b6552e2ad5ed112bbad3a13e083b7http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_alpha.debSize/MD5 checksum: 14078 1a03d5c6f3dff85bcd9a20e5b1286c79http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_alpha.debSize/MD5 checksum: 63892 3a8013ede5a68f62af818bd6f13369eaARM architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_arm.debSize/MD5 checksum: 193994 b2547bee30b2db32b8fd53943a6a0c1ehttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_arm.debSize/MD5 checksum: 15108 1e284480e2ec8e1e45c11d6035847f37http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_arm.debSize/MD5 checksum: 13430 3424c37fbb757be208ac220636b1a3e6http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_arm.debSize/MD5 checksum: 53572 9ee34e2dc31d9bb9eb7f430e9c259c3eIntel IA-32 architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_i386.debSize/MD5 checksum: 185196 b59c131ae306280c722716ac3d54ac37http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_i386.debSize/MD5 checksum: 14786 c5524b1271c4dd6863d16af09b3f5427http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_i386.debSize/MD5 checksum: 13300 b95830c76892050c2f78e924a4881b6chttp://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_i386.debSize/MD5 checksum: 51018 c1b98bd10d698030abde5e608a694762Intel IA-64 architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_ia64.debSize/MD5 checksum: 259426 34814d6a05215a9cbd3e5c96420d16ddhttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_ia64.debSize/MD5 checksum: 16156 65ff55faefafac7d4283ce57441d7d00http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_ia64.debSize/MD5 checksum: 15240 ff38757ef93dc3bf1027062c6f3bc06ehttp://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_ia64.debSize/MD5 checksum: 100186 cc86feab05680b136abd9730a42c49c7HP Precision architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_hppa.debSize/MD5 checksum: 195424 bd2d9eae9a1b3dd8fefd11c30520baa7http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_hppa.debSize/MD5 checksum: 15250 93505675caf2cb172abae2219ed0e5ebhttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_hppa.debSize/MD5 checksum: 13620 e6d96de79a3c2963cad57c189ce4efd8http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_hppa.debSize/MD5 checksum: 55176 d6b01189015ccf70c6cdb9e34dfa3253Motorola 680x0 architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_m68k.debSize/MD5 checksum: 187538 c5d11a2c4504d6c828fa34927faa2a4ahttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_m68k.debSize/MD5 checksum: 14930 9bb0a67c7b56e72a6053e3c4ab175079http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_m68k.debSize/MD5 checksum: 13466 30cab37a51d6909c46adde55df5dc98ehttp://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_m68k.debSize/MD5 checksum: 53768 9338807e769384d2d42910905b8d7806Big endian MIPS architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_mips.debSize/MD5 checksum: 185540 45d1de10e0b9c3648a8ecc64ca218533http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_mips.debSize/MD5 checksum: 15198 a4336aa15162d94eefe5092f1e08236bhttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_mips.debSize/MD5 checksum: 13392 3eca61944f10a2465af5c2fb30009e45http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_mips.debSize/MD5 checksum: 51178 3188ea4887b232248496e3ecc181a2c0Little endian MIPS architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_mipsel.debSize/MD5 checksum: 185238 81527febb4de912fe2afd4dc6d268812http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_mipsel.debSize/MD5 checksum: 15206 11abb4dd2097a410a5478c8ad65aca89http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_mipsel.debSize/MD5 checksum: 13374 fba244b6ab2498f8992dbf76a207ef03http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_mipsel.debSize/MD5 checksum: 50586 4fa3092c389d8622d710c0a382e5756aPowerPC architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_powerpc.debSize/MD5 checksum: 187538 aa2be77ac0297e0dad79c109f3e358dbhttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_powerpc.debSize/MD5 checksum: 14902 e131b0dfe4e60a0969ced8d58c4c8c12http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_powerpc.debSize/MD5 checksum: 13412 c163239ed250b5b8644e2a411ea2f357http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_powerpc.debSize/MD5 checksum: 52864 6d12535b030bd36a5652de3eaabe62c9IBM S/390 architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_s390.debSize/MD5 checksum: 192056 59da9c083e9ac891c9450df298b28138http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_s390.debSize/MD5 checksum: 14914 96ae3b7102d045ed006b6bfd3b0cba46http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_s390.debSize/MD5 checksum: 13514 8c99f89a1a0aaa511b0a9b55669c9d78http://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_s390.debSize/MD5 checksum: 50554 84a7e86dda458b6fd5f11e71734917f8Sun Sparc architecture:http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_0.4.9.0l-7.2_sparc.debSize/MD5 checksum: 204554 c673d5f9fe461cff9d480d5e27ef9266http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_0.4.9.0l-7.2_sparc.debSize/MD5 checksum: 15250 a9f2c0fd52c533eb9feb957ccd1e280ehttp://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_0.4.9.0l-7.2_sparc.debSize/MD5 checksum: 13436 6f6659414591599f5648665e8285793ehttp://security.debian.org/pool/updates/main/h/heartbeat/stonith_0.4.9.0l-7.2_sparc.debSize/MD5 checksum: 68248 fd05a5e856c774272407e0be0c4a3432补丁安装方法:1. 手工安装补丁包:首先,使用下面的命令来下载补丁软件:# wget url (url是补丁下载链接地址然后,使用下面的命令来安装补丁:# dpkg -i file.deb (file是相应的补丁名2. 使用apt-get自动安装补丁包:首先,使用下面的命令更新内部数据库:# apt-get update然后,使用下面的命令安装更新软件包:# apt-get upgradeLinux-HA--------目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载使用最新版本0.4.9.2和0.4.9e:http://linux-ha.org/download/
参考链接
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000540
http://linux-ha.org/security/sec01.txt
http://www.debian.org/security/2002/dsa-174
http://www.iss.net/security_center/static/10357.php
http://www.novell.com/linux/security/advisories/2002_037_heartbeat.html
http://www.securityfocus.com/bid/5955
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 linux-ha heartbeat * Up to (including) 0.4.9
运行在以下环境
系统 debian_10 heartbeat * Up to (excluding) 0.4.9.2-1
运行在以下环境
系统 debian_11 heartbeat * Up to (excluding) 0.4.9.2-1
运行在以下环境
系统 debian_12 heartbeat * Up to (excluding) 0.4.9.2-1
运行在以下环境
系统 debian_3.0 heartbeat * Up to (excluding) 0.4.9.0l-7.2
运行在以下环境
系统 debian_sid heartbeat * Up to (excluding) 0.4.9.2-1
阿里云评分 7.8
  • 攻击路径 远程
  • 攻击复杂度 容易
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 传输被破坏
  • 服务器危害 服务器失陷
  • 全网数量 N/A
CWE-ID 漏洞类型
NVD-CWE-Other
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  1