漏洞信息详情
APSIS Pound远程格式字符串漏洞
漏洞简介
Pound 1.5及之前版本的svc.c中的logmsg函数存在格式字符串漏洞。远程攻击者可以借助系统记录消息中的格式字符串说明符执行任意代码。
漏洞公告
The vendor has released an upgrade to address this issue: Gentoo Linux has released an advisory (GLSA 200405-08) that addresses this issue. Please see the referenced advisory for further information. It is advised that administrators execute as superuser to update Pound: emerge sync emerge -pv ">=net-www/pound-1.6" emerge ">=net-www/pound-1.6" APSIS Pound 1.5
- APSIS Pound-current.tgz http://www.apsis.ch/pound/Pound-current.tgz
参考网址
来源: BID 名称: 10267 链接:http://www.securityfocus.com/bid/10267 来源: GENTOO 名称: GLSA-200405-08 链接:http://security.gentoo.org/glsa/glsa-200405-08.xml 来源: SECUNIA 名称: 11528 链接:http://secunia.com/advisories/11528 来源: XF 名称: pound-logmsg-format-string(16033) 链接:http://xforce.iss.net/xforce/xfdb/16033 来源: OSVDB 名称: 5746 链接:http://www.osvdb.org/5746 来源: www.apsis.ch 链接:http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000 来源: SECTRACK 名称: 1010034 链接:http://securitytracker.com/id?1010034 来源: FULLDISC 名称: 20040507 Pound
受影响实体
- Apsis Pound:1.0<!--2000-1-1-->
- Apsis Pound:1.5<!--2000-1-1-->
- Apsis Pound:1.4<!--2000-1-1-->
- Apsis Pound:1.3<!--2000-1-1-->
- Apsis Pound:1.2<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...