漏洞信息详情
Apache Rewrite模块任意文件泄露漏洞
漏洞简介
Apache是一款使用广泛的开放源代码WEB服务程序。mod_rewrite是Apache 1.2及之后版本捆绑的模块,用于将特殊URL映射到Web Server的文件系统中的绝对文件。
Apache的mod_rewrite在处理特殊的路径串时存在问题,远程攻击者可能利用此漏洞在主机读取任意文件。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
厂商补丁:
Apache Group
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.apache.org" target="_blank">
http://www.apache.org
MandrakeSoft
------------
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2000:060)以及相应补丁:
MDKSA-2000:060:apache update
链接:
http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-060.php3" target="_blank">
http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-060.php3
补丁下载:
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates
ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2000:088-04)以及相应补丁:
RHSA-2000:088-04:Updated apache, php, mod_perl, and auth_ldap packages available.
链接:https://www.redhat.com/support/errata/RHSA-2000-088.html
补丁下载:
Red Hat Linux 5.2:
alpha:
ftp://updates.redhat.com/5.2/alpha/apache-1.3.14-2.5.x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/apache-devel-1.3.14-2.5.x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/mod_perl-1.19-2.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/php-3.0.17-1.5.x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/php-manual-3.0.17-1.5.x.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/php-pgsql-3.0.17-1.5.x.alpha.rpm
sparc:
ftp://updates.redhat.com/5.2/sparc/apache-1.3.14-2.5.x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/apache-devel-1.3.14-2.5.x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/mod_perl-1.19-2.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/php-3.0.17-1.5.x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/php-manual-3.0.17-1.5.x.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/php-pgsql-3.0.17-1.5.x.sparc.rpm
i386:
ftp://updates.redhat.com/5.2/i386/apache-1.3.14-2.5.x.i386.rpm
ftp://updates.redhat.com/5.2/i386/apache-devel-1.3.14-2.5.x.i386.rpm
ftp://updates.redhat.com/5.2/i386/mod_perl-1.19-2.i386.rpm
ftp://updates.redhat.com/5.2/i386/php-3.0.17-1.5.x.i386.rpm
ftp://updates.redhat.com/5.2/i386/php-manual-3.0.17-1.5.x.i386.rpm
ftp://updates.redhat.com/5.2/i386/php-pgsql-3.0.17-1.5.x.i386.rpm
sources:
参考网址
来源:httpd.apache.org%3E
链接:httpd.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.
来源:CALDERA
链接:http://www.calderasystems.com/support/security/advisories/CSSA-2000-035.0.txt
来源:HP
链接:http://archives.neohapsis.com/archives/hp/2000-q4/0021.html
来源:MLIST
链接:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.
来源:BUGTRAQ
链接:http://archives.neohapsis.com/archives/bugtraq/2000-10/0174.html
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2000-095.html
来源:MLIST
链接:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/5310
来源:BID
链接:https://www.securityfocus.com/bid/1728
来源:MLIST
链接:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.
来源:MANDRAKE
链接:http://www.linux-mandrake.com/en/security/MDKSA-2000-060-2.php3?dis=7.1
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2000-088.html
来源:MLIST
链接:https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.
来源:BUGTRAQ
链接:http://archives.neohapsis.com/archives/bugtraq/2000-09/0352.html
受影响实体
- Apache Http_server:1.0.5<!--2000-1-1-->
- Apache Http_server:1.1<!--2000-1-1-->
- Apache Http_server:1.1.1<!--2000-1-1-->
- Apache Http_server:1.3.11:Win32<!--2000-1-1-->
- Apache Http_server:1.3.12<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...