漏洞信息详情
Apache POI 资源管理错误漏洞
漏洞简介
Apache POI是美国阿帕奇(Apache)基金会的一个开源函数库,它提供API给Java程序可对Microsoft Office格式档案进行读和写。
Apache POI 3.17之前版本中存在资源管理错误漏洞。攻击者可借助特制的WMF、EMF、MSG和宏或特制的DOC、PPT和XLS利用该漏洞造成拒绝服务(内存不足和无限循环)。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E
参考网址
来源:BID
链接:http://www.securityfocus.com/bid/102879
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
来源:BID
链接:https://www.securityfocus.com/bid/102879
来源:N/A
链接:https://www.oracle.com/security-alerts/cpuapr2020.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020.html
来源:MLIST
链接:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:MLIST
链接:https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:1322
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10887987
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10887995
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10887989
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10887985
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10887991
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2536/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuapr2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4753/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020verbose.html
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10887985
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-apache-poi-as-used-by-ibmqradar-siem-is-vulnerable-to-information-disclosure-cve-2019-12415-cve-2017-12626/
来源:www.oracle.com
链接:https://www.oracle.com/technetwork/security-advisory/cpuoct2019verbose-5072833.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1146424
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4519/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042626
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-open-source-used-in-ibm-cloud-pak-system/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1142626
受影响实体
- Apache Poi:3.14<!--2000-1-1-->
- Apache Poi:3.11:Beta1<!--2000-1-1-->
- Apache Poi:3.10:Beta2<!--2000-1-1-->
- Apache Poi:3.10:Beta1<!--2000-1-1-->
- Apache Poi:3.10<!--2000-1-1-->
补丁
- Apache POI 安全漏洞的修复措施<!--2018-1-30-->
还没有评论,来说两句吧...