漏洞信息详情
PHP 缓冲区错误漏洞
漏洞简介
PHP是一种在服务器端执行的脚本语言。
PHP 存在缓冲区错误漏洞,攻击者可以通过 FPM 绕过 PHP 的访问限制,以读取或更改数据。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://bugs.php.net/bug.php?id=81026
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4993
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4992
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/
来源:MISC
链接:https://bugs.php.net/bug.php?id=81026
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20211118-0003/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/10/26/7
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/PHP-read-write-access-via-FPM-36691
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3540
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164698/Ubuntu-Security-Notice-USN-5125-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3963
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-21703
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021102719
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3601
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021102621
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-21703
受影响实体
暂无
补丁
- PHP 缓冲区错误漏洞的修复措施<!--2021-10-20-->
还没有评论,来说两句吧...