漏洞信息详情
Gauntlet防火墙远程缓冲区溢出漏洞
漏洞简介
gauntlet和WebShield中CyberPatrol守护程序\"cyberdaemon\"存在缓冲区溢出漏洞。远程攻击者利用此漏洞导致拒绝服务或执行任意文件。
漏洞公告
Patches from NAI are available. Network Associates WebShield E-ppliance 100.0
- NAI WebShield 100 cyber.patch http://download.nai.com/products/patches/WebShield/W100/cyber.patch
- NAI WebShield 300 cyber.patch http://download.nai.com/products/patches/WebShield/W300/cyber.patch
- NAI WS4.0 cyber.patch http://download.nai.com/products/patches/WebShield/Wfs40/cyber.patch
- NAI Gauntlet Firewall for Unix and WebShield cyberdaemon Buffer Overflow Vulnerability Advisory http://www.tis.com/support/cyberadvisory.html
- NAI Gauntlet 4.2 cyber.patch http://download.nai.com/products/patches/gauntlet/4.2/cyber.patch
- NAI Gauntlet Firewall for Unix and WebShield cyberdaemon Buffer Overflow Vulnerability Advisory http://www.tis.com/support/cyberadvisory.html
- NAI Gauntlet 5.0 cyber.patch http://download.nai.com/products/patches/gauntlet/5.0/cyber.patch
- NAI Gauntlet Firewall for Unix and WebShield cyberdaemon Buffer Overflow Vulnerability Advisory http://www.tis.com/support/cyberadvisory.html
- NAI Gauntlet 5.5 cyber.patch http://download.nai.com/products/patches/gauntlet/5.5/cyber.patch
- NAI Gauntlet Firewall for Unix and WebShield cyberdaemon Buffer Overflow Vulnerability Advisory http://www.tis.com/support/cyberadvisory.html
参考网址
来源: www.tis.com 链接:http://www.tis.com/support/cyberadvisory.html 来源: www.pgp.com 链接:http://www.pgp.com/jump/gauntlet_advisory.asp 来源: BID 名称: 1234 链接:http://www.securityfocus.com/bid/1234 来源: OSVDB 名称: 322 链接:http://www.osvdb.org/322 来源: BUGTRAQ 名称: 20000522 Gauntlet CyberPatrol Buffer Overflow 链接:http://archives.neohapsis.com/archives/bugtraq/2000-05/0249.html
受影响实体
- Network_associates Gauntlet_firewall:4.1<!--2000-1-1-->
- Network_associates Gauntlet_firewall:4.2<!--2000-1-1-->
- Network_associates Gauntlet_firewall:5.0<!--2000-1-1-->
- Network_associates Gauntlet_firewall:5.5<!--2000-1-1-->
- Network_associates Webshield:4.0:Solaris<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...