Debian DLA-992-1:eglibc 安全性更新 (堆疊衝突)

high Nessus Plugin ID 100875

概要

遠端 Debian 主機缺少一個安全性更新。

說明

Qualys Research 實驗室發現 GNU C 程式庫的動態連結存在各種問題,攻擊者可藉此透過堆疊衝突,執行本端權限提升。有關完整的詳細資訊,請參閱發佈於以下網址的公告:https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt 針對 Debian 7「Wheezy」,這些問題已在 2.13-38+deb7u12 版本中修正。建議您升級 eglibc 套件。注意:Tenable Network Security 已直接從 DLA 安全性公告擷取前置描述區塊。Tenable 已盡量在不造成其他問題的前提下,嘗試自動清理並將其格式化。

解決方案

升級受影響的套件。

另請參閱

https://lists.debian.org/debian-lts-announce/2017/06/msg00021.html

https://packages.debian.org/source/wheezy/eglibc

https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Plugin 詳細資訊

嚴重性: High

ID: 100875

檔案名稱: debian_DLA-992.nasl

版本: 3.10

類型: local

代理程式: unix

已發布: 2017/6/20

已更新: 2021/1/11

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: High

分數: 8.9

CVSS v2

風險因素: High

基本分數: 7.2

時間分數: 5.6

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

風險因素: High

基本分數: 7.8

時間分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:eglibc-source, p-cpe:/a:debian:debian_linux:glibc-doc, p-cpe:/a:debian:debian_linux:libc-bin, p-cpe:/a:debian:debian_linux:libc-dev-bin, p-cpe:/a:debian:debian_linux:libc0.1, p-cpe:/a:debian:debian_linux:libc0.1-dbg, p-cpe:/a:debian:debian_linux:libc0.1-dev, p-cpe:/a:debian:debian_linux:libc0.1-dev-i386, p-cpe:/a:debian:debian_linux:libc0.1-i386, p-cpe:/a:debian:debian_linux:libc0.1-i686, p-cpe:/a:debian:debian_linux:libc0.1-pic, p-cpe:/a:debian:debian_linux:libc0.1-prof, p-cpe:/a:debian:debian_linux:libc6, p-cpe:/a:debian:debian_linux:libc6-amd64, p-cpe:/a:debian:debian_linux:libc6-dbg, p-cpe:/a:debian:debian_linux:libc6-dev, p-cpe:/a:debian:debian_linux:libc6-dev-amd64, p-cpe:/a:debian:debian_linux:libc6-dev-i386, p-cpe:/a:debian:debian_linux:libc6-dev-mips64, p-cpe:/a:debian:debian_linux:libc6-dev-mipsn32, p-cpe:/a:debian:debian_linux:libc6-dev-ppc64, p-cpe:/a:debian:debian_linux:libc6-dev-s390, p-cpe:/a:debian:debian_linux:libc6-dev-s390x, p-cpe:/a:debian:debian_linux:libc6-dev-sparc64, p-cpe:/a:debian:debian_linux:libc6-i386, p-cpe:/a:debian:debian_linux:libc6-i686, p-cpe:/a:debian:debian_linux:libc6-loongson2f, p-cpe:/a:debian:debian_linux:libc6-mips64, p-cpe:/a:debian:debian_linux:libc6-mipsn32, p-cpe:/a:debian:debian_linux:libc6-pic, p-cpe:/a:debian:debian_linux:libc6-ppc64, p-cpe:/a:debian:debian_linux:libc6-prof, p-cpe:/a:debian:debian_linux:libc6-s390, p-cpe:/a:debian:debian_linux:libc6-s390x, p-cpe:/a:debian:debian_linux:nscd, cpe:/o:debian:debian_linux:7.0, p-cpe:/a:debian:debian_linux:libc6-sparc64, p-cpe:/a:debian:debian_linux:libc6-xen, p-cpe:/a:debian:debian_linux:libc6.1, p-cpe:/a:debian:debian_linux:libc6.1-dbg, p-cpe:/a:debian:debian_linux:libc6.1-dev, p-cpe:/a:debian:debian_linux:libc6.1-pic, p-cpe:/a:debian:debian_linux:libc6.1-prof, p-cpe:/a:debian:debian_linux:locales, p-cpe:/a:debian:debian_linux:locales-all, p-cpe:/a:debian:debian_linux:multiarch-support

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2017/6/19

弱點發布日期: 2017/6/19

參考資訊

CVE: CVE-2017-1000366