White_Dune 'Scene.cpp'栈缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114204 漏洞类型 缓冲区溢出
发布时间 2008-01-02 更新时间 2008-10-11
CVE编号 CVE-2008-0100 CNNVD-ID CNNVD-200801-062
漏洞平台 Multiple CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/30970
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200801-062
|漏洞详情
White_Dune是VRML97文件的开源编辑器和查看器。White_Dune的实现上存在多个安全漏洞,远程攻击者可能利用此漏洞控制用户系统。-----------------------------------Scene::errorf缓冲区溢出-----------------------------------用于创建解析WRL文件中所出现问题的错误消息的函数中存在缓冲区溢出漏洞。以下是Scene.cpp文件中的漏洞代码:voidScene::errorf(constchar*fmt,...){va_listap;charbuf[1024],buf2[1024];constchar*url="";va_start(ap,fmt);vsprintf(buf,fmt,ap);if(TheApp->getImportURL()!=NULL)url=TheApp->getImportURL();mysnprintf(buf2,1024,"%s%d:%s",url,lineno,buf);_compileErrors+=buf2;}------------------------------
|漏洞EXP
source: http://www.securityfocus.com/bid/27102/info

White_Dune is affected by a format-string vulnerability and a buffer-overflow vulnerability.

Exploiting these issues can allow local attackers to execute arbitrary code in the context of the application.

Versions prior to White_Dune 0.29beta795 are affected. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30970.zip
|参考资料

来源:BID
名称:27102
链接:http://www.securityfocus.com/bid/27102
来源:SECUNIA
名称:28287
链接:http://secunia.com/advisories/28287
来源:XF
名称:whitedune-sceneerrorf-bo(39385)
链接:http://xforce.iss.net/xforce/xfdb/39385
来源:BUGTRAQ
名称:20080102Buffer-overflowandformatstringinWhite_Dune0.29beta791
链接:http://www.securityfocus.com/archive/1/archive/1/485724/100/0/threaded
来源:vrml.cip.ica.uni-stuttgart.de
链接:http://vrml.cip.ica.uni-stuttgart.de/dune/news.html
来源:MISC
链接:http://aluigi.altervista.org/adv/whitedunboffs-adv.txt
来源:SREASON
名称:3516
链接:http://securityreason.com/securityalert/3516
来源:NSFOCUS
名称:11342
链接:http://www.nsfocus.net/vulndb/11342