gzip是一款非常流行的文件压缩工具。 gzip解压文档文件的方式中存在空指针引用或死循环漏洞。如果受害用户解压了特制文档的话,就会导致gzip挂起或崩溃。 此外,gzip解压文档文件的方式中存在几个缓冲区溢出漏洞。如果受害用户解压了特制文档的话,就会导致gzip崩溃或执行任意代码。 Debian Linux 3.1 FreeBSD FreeBSD 6.1 FreeBSD FreeBSD 6.0 FreeBSD FreeBSD 5.5 FreeBSD FreeBSD 5.4 FreeBSD FreeBSD 5.3 FreeBSD FreeBSD 4.11 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 RedHat Enterprise Linux AS 4 RedHat Enterprise Linux AS 3 RedHat Enterprise Linux AS 2.1 GNU gzip 1.3.5 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-1181-1)以及相应补丁: DSA-1181-1:New gzip packages fix arbitrary code execution 链接:<a href="http://www.debian.org/security/2005/dsa-1181" target="_blank">http://www.debian.org/security/2005/dsa-1181</a> 补丁下载: Source archives: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc"...
gzip是一款非常流行的文件压缩工具。 gzip解压文档文件的方式中存在空指针引用或死循环漏洞。如果受害用户解压了特制文档的话,就会导致gzip挂起或崩溃。 此外,gzip解压文档文件的方式中存在几个缓冲区溢出漏洞。如果受害用户解压了特制文档的话,就会导致gzip崩溃或执行任意代码。 Debian Linux 3.1 FreeBSD FreeBSD 6.1 FreeBSD FreeBSD 6.0 FreeBSD FreeBSD 5.5 FreeBSD FreeBSD 5.4 FreeBSD FreeBSD 5.3 FreeBSD FreeBSD 4.11 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 RedHat Enterprise Linux AS 4 RedHat Enterprise Linux AS 3 RedHat Enterprise Linux AS 2.1 GNU gzip 1.3.5 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-1181-1)以及相应补丁: DSA-1181-1:New gzip packages fix arbitrary code execution 链接:<a href="http://www.debian.org/security/2005/dsa-1181" target="_blank">http://www.debian.org/security/2005/dsa-1181</a> 补丁下载: Source archives: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc</a> Size/MD5 checksum: 566 b4ef2a9e595a17f8596fdefb1f4b9bf6 <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz</a> Size/MD5 checksum: 60478 cd1bec47a01d72c800f3bac85dfcc5f3 <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz</a> Size/MD5 checksum: 331550 3d6c191dfd2bf307014b421c12dc8469 Alpha architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb</a> Size/MD5 checksum: 83740 450c8d78aa9654ab651ac21115834432 AMD64 architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb</a> Size/MD5 checksum: 75370 cf8896b90d00dc8fce58ab1e88149674 ARM architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb</a> Size/MD5 checksum: 76472 24b1723495120c89b9a1a55712fc557d HP Precision architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb</a> Size/MD5 checksum: 79586 9a2d72859917de0f8b269ea95f392b2b Intel IA-32 architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb</a> Size/MD5 checksum: 71164 8267f1f753b0a2b380d149280b6e44bb Intel IA-64 architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb</a> Size/MD5 checksum: 91588 30b9aa547cfacc09cee832a9b7516b6e Motorola 680x0 architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb</a> Size/MD5 checksum: 69110 cf17c8d59a6204c2dce1828f2b1f24c6 Big endian MIPS architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb</a> Size/MD5 checksum: 79488 e2242db1fb6e1c589a67658f96ba7f27 Little endian MIPS architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb</a> Size/MD5 checksum: 79350 da63d665a88c29c6cf07b1ef3566ecd1 PowerPC architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb</a> Size/MD5 checksum: 76948 12e742fd43b8325e89f3b96e0cdd89a6 IBM S/390 architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb</a> Size/MD5 checksum: 77540 0e75950ede6c45a332eead6d71b7e7a2 Sun Sparc architecture: <a href="http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb" target="_blank">http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb</a> Size/MD5 checksum: 74654 471feed410766674a72327e58702febd 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade FreeBSD ------- FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-06:21)以及相应补丁: FreeBSD-SA-06:21:Multiple vulnerabilities in gzip 链接:<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc" target="_blank">ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:21.gzip.asc</a> 补丁下载: 执行以下步骤之一: 1) 将有漏洞的系统升级到4-STABLE, 5-STABLE或6-STABLE,或修改日期之后的RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3或RELENG_4_11安全版本. 2) 为当前系统打补丁: 以下补丁确认可应用于FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0和6.1系统. a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名. # fetch <a href="http://security.FreeBSD.org/patches/SA-06:21/gzip.patch" target="_blank">http://security.FreeBSD.org/patches/SA-06:21/gzip.patch</a> # fetch <a href="http://security.FreeBSD.org/patches/SA-06:21/gzip.patch.asc" target="_blank">http://security.FreeBSD.org/patches/SA-06:21/gzip.patch.asc</a> b) 以root执行以下命令: # cd /usr/src # patch < /path/to/patch # cd /usr/src/gnu/usr.bin/gzip # make obj && make depend && make && make install RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2006:0667-01)以及相应补丁: RHSA-2006:0667-01:Moderate: gzip security update 链接:<a href="http://lwn.net/Alerts/200049/?format=printable" target="_blank">http://lwn.net/Alerts/200049/?format=printable</a>