Vulnerabilities > CVE-2007-2835 - Unspecified vulnerability in Unicon-Imc2 3.0.4
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN unicon-imc2
nessus
Summary
Multiple stack-based buffer overflows in (1) CCE_pinyin.c and (2) xl_pinyin.c in ImmModules/cce/ in unicon-imc2 3.0.4, as used by zhcon and other applications, allow local users to gain privileges via a long HOME environment variable.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-1328.NASL |
description | Steve Kemp from the Debian Security Audit project discovered that unicon-imc2, a Chinese input method library, makes unsafe use of an environmental variable, which may be exploited to execute arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25640 |
published | 2007-07-02 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25640 |
title | Debian DSA-1328-1 : unicon-imc2 - buffer overflow |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24719 CVE(CAN) ID: CVE-2007-2835 unicon-imc2是Debian操作系统中所使用的中文输入法库。 unicon-imc2在使用环境变量数据时存在缓冲区溢出漏洞,本地攻击者可能利用此漏洞提升自己的权限。 unicon-imc2库没有安全地使用HOME环境变量,如果用户使用了链接到该函数库的应用程序的话就可能触发缓冲区溢出,导致以root用户权限执行任意指令。漏洞代码位于/unicon/ImmModules/cce/CCE_pinyin.c文件中: static int IMM_Flush () { char name[256]; sprintf(name,"%s/.pyinput/usrphrase.tab",getenv("HOME")); SaveUsrPhrase(name); sprintf(name,"%s/.pyinput/sysfrequency.tab",getenv("HOME")); SavePhraseFrequency(name); return 1; } 此外/unicon/ImmModules/cce/xl_pinyin.c文件中也存在类似问题。 Debian unicon-imc2 3.0.4 Debian ------ Debian已经为此发布了一个安全公告(DSA-1328-1)以及相应补丁: DSA-1328-1:New unicon-imc2 packages fix buffer overflow 链接:<a href="http://www.debian.org/security/2007/dsa-1328" target="_blank">http://www.debian.org/security/2007/dsa-1328</a> 补丁下载: Source archives: <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz</a> Size/MD5 checksum: 14966 c3a081d69f9f81055de331690bf85e70 <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz</a> Size/MD5 checksum: 5704272 dfb8650debe038f85270b4ad60ad313b <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc</a> Size/MD5 checksum: 603 711b8ba2894e03f257f7d6a74f526563 alpha architecture (DEC Alpha) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb</a> Size/MD5 checksum: 4376642 8cfd1066d51dc11862115179be4ce4e4 amd64 architecture (AMD x86_64 (AMD64)) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb</a> Size/MD5 checksum: 4362080 bad015c61850c9a4fe5d85edc77073fd arm architecture (ARM) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb</a> Size/MD5 checksum: 4152566 0d8b6a4a3bab316d49eea2211affea61 hppa architecture (HP PA RISC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb</a> Size/MD5 checksum: 4546634 dbdc37a0fb794ac2d806a1c960ff7c43 i386 architecture (Intel ia32) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb</a> Size/MD5 checksum: 4153202 24ddede20e4b9ad3b15694275ad9d597 ia64 architecture (Intel ia64) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb</a> Size/MD5 checksum: 4387184 c9494e9f38687b4cafb6b291942ddf6a mipsel architecture (MIPS (Little Endian)) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb</a> Size/MD5 checksum: 4159956 05c58cfe2805a3cd5a20171943e241c4 powerpc architecture (PowerPC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb</a> Size/MD5 checksum: 4516520 cb01b1bbc9bf724b7c6e97231945a964 s390 architecture (IBM S/390) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb</a> Size/MD5 checksum: 4544838 7c2e4aa746330e0d94417a7254f03714 sparc architecture (Sun SPARC/UltraSPARC) <a href="http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb" target="_blank">http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb</a> Size/MD5 checksum: 4501702 246893314e59799c4cabc3353fa8998f 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade |
id | SSV:1959 |
last seen | 2017-11-19 |
modified | 2007-07-04 |
published | 2007-07-04 |
reporter | Root |
title | Unicon-imc2环境变量本地缓冲区溢出漏洞 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431336
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431336
- http://osvdb.org/37794
- http://osvdb.org/37794
- http://secunia.com/advisories/25910
- http://secunia.com/advisories/25910
- http://secunia.com/advisories/25912
- http://secunia.com/advisories/25912
- http://www.debian.org/security/2007/dsa-1328
- http://www.debian.org/security/2007/dsa-1328
- http://www.securityfocus.com/bid/24719
- http://www.securityfocus.com/bid/24719
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35382
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35382