CVE编号
CVE-2012-4557利用情况
暂无补丁情况
官方补丁披露时间
2012-12-01漏洞描述
Apache HTTP Server是一款流行的WEB服务程序。Apache HTTP Server mod_proxy_ajp模块在检测到超长请求处理时间(超过超时阈值)时会把worker节点转换到错误状态,允许攻击者提交恶意请求进行拒绝服务攻击。解决建议
用户可参考如下厂商提供的安全公告获得补丁信息:http://svn.apache.org/viewvc?view=revision
参考链接 |
|
---|---|
http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22 | |
http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html | |
http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html | |
http://marc.info/?l=bugtraq&m=136612293908376&w=2 | |
http://svn.apache.org/viewvc?view=revision&revision=1227298 | |
http://www.debian.org/security/2012/dsa-2579 | |
https://bugzilla.redhat.com/show_bug.cgi?id=871685 | |
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5... | |
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360... | |
https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4d... | |
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef... | |
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86... | |
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b... | |
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec... | |
https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51... | |
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694... | |
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f... | |
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20... | |
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5... | |
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f... | |
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806ce... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.12 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.13 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.14 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.15 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.16 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.17 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.18 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.19 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.20 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.2.21 | - | |||||
运行在以下环境 | |||||||||
系统 | centos_6 | apache2 | * |
Up to (excluding) 2.2.15-26.el6.centos |
|||||
运行在以下环境 | |||||||||
系统 | debian_6 | apache2 | * |
Up to (excluding) 2.2.16-6+squeeze10 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | apache2 | * |
Up to (excluding) 2.2.15-26.0.1.el6 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 传输被破坏
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...