Apache HTTP Server 缓冲区错误漏洞

admin 2024-01-15 07:38:33 YS 来源:ZONE.CI 全球网 0 阅读模式
> Apache HTTP Server 缓冲区错误漏洞

Apache HTTP Server 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-202008-281 CVE编号 CVE-2020-11984
发布时间 2020-08-07 更新时间 2021-01-20
漏洞类型 缓冲区错误 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

Apache HTTP Server是美国阿帕奇软件(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。

Apache HTTP Server 2.4.32版本至2.4.44版本中的mod_uwsgi存在缓冲区错误漏洞。攻击者可利用该漏洞获取信息并可能执行代码。

漏洞补丁

目前厂商已发布升级了Apache HTTP Server 缓冲区错误漏洞的补丁,Apache HTTP Server 缓冲区错误漏洞的补丁获取链接:

参考网址

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/08/08/9

来源:httpd.apache.org%3E

链接:httpd.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672@%3Cdev.

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/08/08/8

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4757

来源:GENTOO

链接:https://security.gentoo.org/glsa/202008-04

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html

来源:MISC

链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/08/08/10

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4458-1/

来源:MLIST

链接:https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1@%3Cdev.

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/08/10/5

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200814-0005/

来源:httpd.apache.org

链接:httpd.apache.org/security/vulnerabilities_24.html

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/08/17/2

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4295/

来源:www.oracle.com

链接:https://www.oracle.com/security-alerts/cpujan2021.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3708/

来源:http-server

链接:http-server/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-rational-build-forge-security-advisory-for-apache-

来源:httpd-buffer-overflow-via-mod-proxy-uwsgi-33036

链接:httpd-buffer-overflow-via-mod-proxy-uwsgi-33036

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Apache-

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2961/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11984

来源:www.oracle.com

链接:https://www.oracle.com/security-alerts/cpuoct2020.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2988/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159753/Red-Hat-Security-Advisory-2020-4384-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2735/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158864/Ubuntu-Security-Notice-USN-4458-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2903/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158801/Gentoo-Linux-Security-Advisory-202008-04.html

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/49286

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2806/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202008-281

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  2