Apache HTTP Server 环境问题漏洞

admin 2024-01-15 07:41:13 YS 来源:ZONE.CI 全球网 0 阅读模式
> Apache HTTP Server 环境问题漏洞

Apache HTTP Server 环境问题漏洞

CNNVD-ID编号 CNNVD-202008-291 CVE编号 CVE-2020-11993
发布时间 2020-08-07 更新时间 2021-01-21
漏洞类型 环境问题 漏洞来源 Google Security Research
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

Apache HTTP Server是美国阿帕奇软件(Apache Software)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。

Apache HTTP Server 2.4.20版本至2.4.43版本中存在环境问题漏洞。攻击者可利用该漏洞造成Push Diary崩溃。

漏洞补丁

目前厂商已发布升级了Apache HTTP Server 环境问题漏洞的补丁,Apache HTTP Server 环境问题漏洞的补丁获取链接:

参考网址

来源:httpd.apache.org%3E

链接:httpd.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672@%3Cdev.

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4757

来源:GENTOO

链接:https://security.gentoo.org/glsa/202008-04

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html

来源:MISC

链接:https://www.oracle.com/security-alerts/cpujan2021.html

来源:MISC

链接:https://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html

来源:MLIST

链接:https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71@%3Cdev.

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4458-1/

来源:MLIST

链接:https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1@%3Cdev.

来源:MISC

链接:https://www.oracle.com/security-alerts/cpuoct2020.html

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200814-0005/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/

来源:httpd.apache.org

链接:httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html

来源:http2-Push-Diary-Trace-Tebug-33037

链接:http2-Push-Diary-Trace-Tebug-33037

来源:httpd-denial-of-service-via-mod-

链接:httpd-denial-of-service-via-mod-

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Apache-

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3734/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4295/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3017/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3708/

来源:http-server

链接:http-server/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-rational-build-forge-security-advisory-for-apache-

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2961/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11993

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2988/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159753/Red-Hat-Security-Advisory-2020-4384-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2735/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158864/Ubuntu-Security-Notice-USN-4458-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2903/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158801/Gentoo-Linux-Security-Advisory-202008-04.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2806/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202008-291

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0