CVE编号
CVE-2007-5198利用情况
暂无补丁情况
N/A披露时间
2007-10-05漏洞描述
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=194178 | |
http://secunia.com/advisories/27124 | |
http://secunia.com/advisories/27362 | |
http://secunia.com/advisories/27609 | |
http://secunia.com/advisories/27965 | |
http://secunia.com/advisories/28930 | |
http://secunia.com/advisories/29862 | |
http://security.gentoo.org/glsa/glsa-200711-11.xml | |
http://sourceforge.net/forum/forum.php?forum_id=740172 | |
http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=298... | |
http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=298... | |
http://www.debian.org/security/2008/dsa-1495 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:067 | |
http://www.novell.com/linux/security/advisories/2007_25_sr.html | |
http://www.securityfocus.com/bid/25952 | |
http://www.ubuntu.com/usn/usn-532-1 | |
http://www.vupen.com/english/advisories/2007/3394 | |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00249.html | |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00282.html | |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00320.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | nagios | plugins | * |
Up to (including) 1.4.9 |
- 攻击路径 网络
- 攻击复杂度 N/A
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 部分地
- 完整性 部分地
还没有评论,来说两句吧...