漏洞信息详情
GNU Screen 参数注入漏洞
漏洞简介
GNU Screen是美国GNU社区的一个应用软件。提供一个物理终端上获得多个虚拟终端的效果。
GNU Screen 中的encoding.c文件存在参数注入漏洞,该漏洞源于未对输入的UTF-8字符安全处理,远程攻击者可通过特殊的UTF-8字符导致产品引发拒绝服务。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.suse.com/support/update/announcement/2021/suse-su-20210491-1
参考网址
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/JJWLXP45POUUYBJRRWPVAWNZDJTLYWVM/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/02/09/8
来源:MISC
链接:https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00000.html
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4861
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/GNWBOIDEPOEQS5RMQVMFKHKXJCGNYWBL/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/02/msg00031.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/202105-11
来源:MISC
链接:https://www.openwall.com/lists/oss-security/2021/02/09/3
来源:MISC
链接:https://ftp.gnu.org/gnu/screen/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-26937
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0593
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2781
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0815
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/GNU-Screen-memory-corruption-via-UTF-8-Character-Sequence-34605
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162788/Gentoo-Linux-Security-Advisory-202105-11.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0696
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161693/Red-Hat-Security-Advisory-2021-0742-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161533/Ubuntu-Security-Notice-USN-4747-1.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052601
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0646
受影响实体
暂无
补丁
- GNU Screen 参数注入漏洞的修复措施<!--2021-2-9-->
还没有评论,来说两句吧...