Lucene search

K
seebugRootSSV:532
HistoryNov 20, 2006 - 12:00 a.m.

GNU GZip文档处理多个安全漏洞

2006-11-2000:00:00
Root
www.seebug.org
28

gzip是一款非常流行的文件压缩工具。

gzip解压文档文件的方式中存在空指针引用或死循环漏洞。如果受害用户解压了特制文档的话,就会导致gzip挂起或崩溃。

此外,gzip解压文档文件的方式中存在几个缓冲区溢出漏洞。如果受害用户解压了特制文档的话,就会导致gzip崩溃或执行任意代码。

Debian Linux 3.1
FreeBSD FreeBSD 6.1
FreeBSD FreeBSD 6.0
FreeBSD FreeBSD 5.5
FreeBSD FreeBSD 5.4
FreeBSD FreeBSD 5.3
FreeBSD FreeBSD 4.11
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux AS 2.1
GNU gzip 1.3.5
厂商补丁:

Debian

Debian已经为此发布了一个安全公告(DSA-1181-1)以及相应补丁:
DSA-1181-1:New gzip packages fix arbitrary code execution
链接:<a href=“http://www.debian.org/security/2005/dsa-1181” target=“_blank”>http://www.debian.org/security/2005/dsa-1181</a>

补丁下载:

Source archives:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc</a>
Size/MD5 checksum: 566 b4ef2a9e595a17f8596fdefb1f4b9bf6
<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz</a>
Size/MD5 checksum: 60478 cd1bec47a01d72c800f3bac85dfcc5f3
<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz</a>
Size/MD5 checksum: 331550 3d6c191dfd2bf307014b421c12dc8469

Alpha architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb</a>
Size/MD5 checksum: 83740 450c8d78aa9654ab651ac21115834432

AMD64 architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb</a>
Size/MD5 checksum: 75370 cf8896b90d00dc8fce58ab1e88149674

ARM architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb</a>
Size/MD5 checksum: 76472 24b1723495120c89b9a1a55712fc557d

HP Precision architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb</a>
Size/MD5 checksum: 79586 9a2d72859917de0f8b269ea95f392b2b

Intel IA-32 architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb</a>
Size/MD5 checksum: 71164 8267f1f753b0a2b380d149280b6e44bb

Intel IA-64 architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb</a>
Size/MD5 checksum: 91588 30b9aa547cfacc09cee832a9b7516b6e

Motorola 680x0 architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb</a>
Size/MD5 checksum: 69110 cf17c8d59a6204c2dce1828f2b1f24c6

Big endian MIPS architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb</a>
Size/MD5 checksum: 79488 e2242db1fb6e1c589a67658f96ba7f27

Little endian MIPS architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb</a>
Size/MD5 checksum: 79350 da63d665a88c29c6cf07b1ef3566ecd1

PowerPC architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb</a>
Size/MD5 checksum: 76948 12e742fd43b8325e89f3b96e0cdd89a6

IBM S/390 architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb</a>
Size/MD5 checksum: 77540 0e75950ede6c45a332eead6d71b7e7a2

Sun Sparc architecture:

<a href=“http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb” target=“_blank”>http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb</a>
Size/MD5 checksum: 74654 471feed410766674a72327e58702febd

补丁安装方法:

  1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

dpkg -i file.deb (file是相应的补丁名)

  1. 使用apt-get自动安装补丁包:

    首先,使用下面的命令更新内部数据库:

    apt-get update

    然后,使用下面的命令安装更新软件包:

    apt-get upgrade

FreeBSD

FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-06:21)以及相应补丁:
FreeBSD-SA-06:21:Multiple vulnerabilities in gzip
链接:<a href=“ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc” target=“_blank”>ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc</a>

补丁下载:

执行以下步骤之一:

  1. 将有漏洞的系统升级到4-STABLE, 5-STABLE或6-STABLE,或修改日期之后的RELENG_6_1,
    RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3或RELENG_4_11安全版本.

  2. 为当前系统打补丁:

以下补丁确认可应用于FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0和6.1系统.

a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名.

fetch <a href=“http://security.FreeBSD.org/patches/SA-06:21/gzip.patch” target=“_blank”>http://security.FreeBSD.org/patches/SA-06:21/gzip.patch</a>

fetch <a href=“http://security.FreeBSD.org/patches/SA-06:21/gzip.patch.asc” target=“_blank”>http://security.FreeBSD.org/patches/SA-06:21/gzip.patch.asc</a>

b) 以root执行以下命令:

cd /usr/src

patch < /path/to/patch

cd /usr/src/gnu/usr.bin/gzip

make obj && make depend && make && make install

RedHat

RedHat已经为此发布了一个安全公告(RHSA-2006:0667-01)以及相应补丁:
RHSA-2006:0667-01:Moderate: gzip security update
链接:<a href=“http://lwn.net/Alerts/200049/?format=printable” target=“_blank”>http://lwn.net/Alerts/200049/?format=printable</a>