Vulnerabilities > CVE-2007-2835 - Buffer Overflow vulnerability in Unicon-Imc2 3.0.4

047910
CVSS 6.8 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
debian
unicon-imc2
nessus

Summary

Multiple stack-based buffer overflows in (1) CCE_pinyin.c and (2) xl_pinyin.c in ImmModules/cce/ in unicon-imc2 3.0.4, as used by zhcon and other applications, allow local users to gain privileges via a long HOME environment variable.

Vulnerable Configurations

Part Description Count
OS
Debian
1
Application
Unicon-Imc2
1

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-1328.NASL
descriptionSteve Kemp from the Debian Security Audit project discovered that unicon-imc2, a Chinese input method library, makes unsafe use of an environmental variable, which may be exploited to execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id25640
published2007-07-02
reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/25640
titleDebian DSA-1328-1 : unicon-imc2 - buffer overflow
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-1328. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include("compat.inc");

if (description)
{
  script_id(25640);
  script_version("1.15");
  script_cvs_date("Date: 2019/08/02 13:32:20");

  script_cve_id("CVE-2007-2835");
  script_xref(name:"DSA", value:"1328");

  script_name(english:"Debian DSA-1328-1 : unicon-imc2 - buffer overflow");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Steve Kemp from the Debian Security Audit project discovered that
unicon-imc2, a Chinese input method library, makes unsafe use of an
environmental variable, which may be exploited to execute arbitrary
code."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.debian.org/security/2007/dsa-1328"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the unicon-imc2 package.

For the stable distribution (etch) this problem has been fixed in
version 3.0.4-11etch1."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:unicon-imc2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/07/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/07/02");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"4.0", prefix:"unicon-imc2", reference:"3.0.4-11etch1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 24719 CVE(CAN) ID: CVE-2007-2835 unicon-imc2是Debian操作系统中所使用的中文输入法库。 unicon-imc2在使用环境变量数据时存在缓冲区溢出漏洞,本地攻击者可能利用此漏洞提升自己的权限。 unicon-imc2库没有安全地使用HOME环境变量,如果用户使用了链接到该函数库的应用程序的话就可能触发缓冲区溢出,导致以root用户权限执行任意指令。漏洞代码位于/unicon/ImmModules/cce/CCE_pinyin.c文件中: static int IMM_Flush () { char name[256]; sprintf(name,&quot;%s/.pyinput/usrphrase.tab&quot;,getenv(&quot;HOME&quot;)); SaveUsrPhrase(name); sprintf(name,&quot;%s/.pyinput/sysfrequency.tab&quot;,getenv(&quot;HOME&quot;)); SavePhraseFrequency(name); return 1; } 此外/unicon/ImmModules/cce/xl_pinyin.c文件中也存在类似问题。 Debian unicon-imc2 3.0.4 Debian ------ Debian已经为此发布了一个安全公告(DSA-1328-1)以及相应补丁: DSA-1328-1:New unicon-imc2 packages fix buffer overflow 链接:<a href="http://www.debian.org/security/2007/dsa-1328" target="_blank">http://www.debian.org/security/2007/dsa-1328</a> 补丁下载: Source archives: <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz</a> Size/MD5 checksum: 14966 c3a081d69f9f81055de331690bf85e70 <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz</a> Size/MD5 checksum: 5704272 dfb8650debe038f85270b4ad60ad313b <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc</a> Size/MD5 checksum: 603 711b8ba2894e03f257f7d6a74f526563 alpha architecture (DEC Alpha) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb</a> Size/MD5 checksum: 4376642 8cfd1066d51dc11862115179be4ce4e4 amd64 architecture (AMD x86_64 (AMD64)) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb</a> Size/MD5 checksum: 4362080 bad015c61850c9a4fe5d85edc77073fd arm architecture (ARM) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb</a> Size/MD5 checksum: 4152566 0d8b6a4a3bab316d49eea2211affea61 hppa architecture (HP PA RISC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb</a> Size/MD5 checksum: 4546634 dbdc37a0fb794ac2d806a1c960ff7c43 i386 architecture (Intel ia32) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb</a> Size/MD5 checksum: 4153202 24ddede20e4b9ad3b15694275ad9d597 ia64 architecture (Intel ia64) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb</a> Size/MD5 checksum: 4387184 c9494e9f38687b4cafb6b291942ddf6a mipsel architecture (MIPS (Little Endian)) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb</a> Size/MD5 checksum: 4159956 05c58cfe2805a3cd5a20171943e241c4 powerpc architecture (PowerPC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb</a> Size/MD5 checksum: 4516520 cb01b1bbc9bf724b7c6e97231945a964 s390 architecture (IBM S/390) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb</a> Size/MD5 checksum: 4544838 7c2e4aa746330e0d94417a7254f03714 sparc architecture (Sun SPARC/UltraSPARC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb</a> Size/MD5 checksum: 4501702 246893314e59799c4cabc3353fa8998f 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade
idSSV:1959
last seen2017-11-19
modified2007-07-04
published2007-07-04
reporterRoot
titleUnicon-imc2环境变量本地缓冲区溢出漏洞