CVE编号
CVE-2003-0993利用情况
暂无补丁情况
N/A披露时间
2004-03-29漏洞描述
mod_access in Apache 1.3 before 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote attackers to bypass intended access restrictions.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:046 | |
http://issues.apache.org/bugzilla/show_bug.cgi?id=23850 | |
http://marc.info/?l=apache-cvs&m=107869603013722 | |
http://marc.info/?l=bugtraq&m=108437852004207&w=2 | |
http://security.gentoo.org/glsa/glsa-200405-22.xml | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1 | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1 | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1 | |
http://www.apacheweek.com/features/security-13 | |
http://www.securityfocus.com/bid/9829 | |
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=sl... | |
http://www.trustix.org/errata/2004/0027 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15422 | |
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab3... | |
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb7... | |
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12... | |
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f... | |
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd6886... | |
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2... | |
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f6988585512... | |
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.1 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.11 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.12 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.14 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.17 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.18 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.19 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.20 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.22 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.23 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.24 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.25 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.26 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.27 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.28 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.29 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.3 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.4 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.6 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.7 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 1.3.9 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 部分地
- 完整性 部分地
还没有评论,来说两句吧...