CVE编号
CVE-2004-0113利用情况
暂无补丁情况
N/A披露时间
2004-03-29漏洞描述
Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000839 | |
http://issues.apache.org/bugzilla/show_bug.cgi?id=27106 | |
http://marc.info/?l=apache-cvs&m=107869699329638 | |
http://marc.info/?l=bugtraq&m=108034113406858&w=2 | |
http://marc.info/?l=bugtraq&m=108369640424244&w=2 | |
http://marc.info/?l=bugtraq&m=108731648532365&w=2 | |
http://security.gentoo.org/glsa/glsa-200403-04.xml | |
http://www.apacheweek.com/features/security-20 | |
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043 | |
http://www.osvdb.org/4182 | |
http://www.redhat.com/support/errata/RHSA-2004-084.html | |
http://www.redhat.com/support/errata/RHSA-2004-182.html | |
http://www.securityfocus.com/bid/9826 | |
http://www.trustix.org/errata/2004/0017 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15419 | |
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e0... | |
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc1... | |
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9... | |
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8... | |
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08... | |
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb7... | |
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12... | |
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525... | |
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6... | |
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f... | |
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd6886... | |
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2... | |
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.35 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.36 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.37 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.38 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.39 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.40 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.41 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.42 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.43 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.44 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.45 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.46 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.47 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.0.48 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...