CVE编号
CVE-2008-1678利用情况
EXP 已公开补丁情况
官方补丁披露时间
2008-07-11漏洞描述
在OpenSSL 0.9.8f through 0.9.8h的libssl中的crypto / comp / c_zlib.c中的zlib_stateful_init函数中的内存泄漏允许远程攻击者通过多次调用导致拒绝服务(内存消耗),正如初始SSL客户机与指定压缩算法的Apache HTTP Server mod_ssl的handshake所示。解决建议
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://www.linux-mandrake.com/en/security/
参考链接 |
|
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=222643 | |
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html | |
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html | |
http://marc.info/?l=openssl-dev&m=121060672602371&w=2 | |
http://secunia.com/advisories/31026 | |
http://secunia.com/advisories/31416 | |
http://secunia.com/advisories/32222 | |
http://secunia.com/advisories/34219 | |
http://secunia.com/advisories/35264 | |
http://secunia.com/advisories/38761 | |
http://secunia.com/advisories/42724 | |
http://secunia.com/advisories/42733 | |
http://secunia.com/advisories/44183 | |
http://security.gentoo.org/glsa/glsa-200807-06.xml | |
http://securityreason.com/securityalert/3981 | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackw... | |
http://support.apple.com/kb/HT3216 | |
http://svn.apache.org/viewvc?view=rev&revision=654119 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124 | |
http://www.redhat.com/support/errata/RHSA-2009-1075.html | |
http://www.securityfocus.com/bid/31681 | |
http://www.securityfocus.com/bid/31692 | |
http://www.ubuntu.com/usn/USN-731-1 | |
http://www.vupen.com/english/advisories/2008/2780 | |
https://bugs.edge.launchpad.net/bugs/186339 | |
https://bugs.edge.launchpad.net/bugs/224945 | |
https://bugzilla.redhat.com/show_bug.cgi?id=447268 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43948 | |
https://issues.apache.org/bugzilla/show_bug.cgi?id=44975 | |
https://kb.bluecoat.com/index?page=content&id=SA50 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8f | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8g | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8h | - | |||||
运行在以下环境 | |||||||||
系统 | centos_5 | apache2 | * |
Up to (excluding) 2.2.3-22.el5.centos.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_5.0 | apache2 | * |
Up to (excluding) 2.2.8-4~lenny1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | apache2 | * |
Up to (excluding) 2.2.3-22.0.1.el5_3.1 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 EXP 已公开
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 传输被破坏
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...