CVE编号
CVE-2004-0493利用情况
暂无补丁情况
N/A披露时间
2004-08-06漏洞描述
Apache httpd 2.0.49中的AP_GET_MIME_Header_CORE函数允许远程攻击者通过包含大量空格或制表符字符的长头行,导致拒绝服务(内存耗尽),并可能导致64位系统上基于堆的缓冲区溢出。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023133.html | |
http://marc.info/?l=bugtraq&m=108853066800184&w=2 | |
http://marc.info/?l=bugtraq&m=109181600614477&w=2 | |
http://security.gentoo.org/glsa/glsa-200407-03.xml | |
http://www.apacheweek.com/features/security-20 | |
http://www.guninski.com/httpd1.html | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:064 | |
http://www.redhat.com/support/errata/RHSA-2004-342.html | |
http://www.securityfocus.com/bid/10619 | |
http://www.trustix.org/errata/2004/0039/ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16524 | |
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e0... | |
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc1... | |
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9... | |
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8... | |
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08... | |
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f... | |
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525... | |
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6... | |
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f... | |
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad7... | |
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea... | |
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.47 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.48 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.49 | - | |||||
运行在以下环境 | |||||||||
应用 | ibm | http_server | 2.0.42 | - | |||||
运行在以下环境 | |||||||||
应用 | ibm | http_server | 2.0.42.1 | - | |||||
运行在以下环境 | |||||||||
应用 | ibm | http_server | 2.0.42.2 | - | |||||
运行在以下环境 | |||||||||
应用 | ibm | http_server | 2.0.47 | - | |||||
运行在以下环境 | |||||||||
应用 | ibm | http_server | 2.0.47.1 | - | |||||
运行在以下环境 | |||||||||
系统 | gentoo | linux | 1.4 | - | |||||
运行在以下环境 | |||||||||
系统 | trustix | secure_linux | 1.5 | - | |||||
运行在以下环境 | |||||||||
系统 | trustix | secure_linux | 2.0 | - | |||||
运行在以下环境 | |||||||||
系统 | trustix | secure_linux | 2.1 | - | |||||
运行在以下环境 | |||||||||
硬件 | avaya | converged_communications_server | 2.0 | - | |||||
运行在以下环境 | |||||||||
硬件 | avaya | s8300 | r2.0.0 | - | |||||
运行在以下环境 | |||||||||
硬件 | avaya | s8500 | r2.0.0 | - | |||||
运行在以下环境 | |||||||||
硬件 | avaya | s8700 | r2.0.0 | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 无
- 完整性 部分地
还没有评论,来说两句吧...