漏洞信息详情
Apache 安全漏洞
漏洞简介
Mod_SSL是Apache服务器上的SSL实现,用来为Apache Web服务器提供加密支持。mod_ssl存在一个内存泄露问题,远程攻击者可以利用这个漏洞发送标准HTTP请求给SSL端口,可导致远程拒绝服务攻击。详细漏洞细节目前没有提供。
漏洞公告
厂商补丁:
Apache Software Foundation
--------------------------
Apache CVS版本已经修正此漏洞:
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_io.c?r1=1.117&r2=1.118" target="_blank">
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_io.c?r1=1.117&r2=1.118
参考网址
来源:httpd.apache.org%3E
链接:httpd.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.
来源:GENTOO
链接:http://security.gentoo.org/glsa/glsa-200403-04.xml
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A876
来源:HP
链接:http://marc.info/?l=bugtraq&m=108731648532365&w=2
来源:MLIST
链接:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.
来源:MISC
链接:http://issues.apache.org/bugzilla/show_bug.cgi?id=27106
来源:OSVDB
链接:http://www.osvdb.org/4182
来源:MLIST
链接:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.
来源:CONFIRM
链接:http://www.apacheweek.com/features/security-20
来源:MLIST
链接:http://marc.info/?l=apache-cvs&m=107869699329638
来源:BUGTRAQ
链接:http://marc.info/?l=bugtraq&m=108034113406858&w=2
来源:CONECTIVA
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000839
来源:MLIST
链接:https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.
来源:BID
链接:https://www.securityfocus.com/bid/9826
来源:MLIST
链接:https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2004-084.html
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2004-182.html
来源:MANDRAKE
链接:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043
来源:MLIST
链接:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/15419
来源:MLIST
链接:https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.
来源:APPLE
链接:http://marc.info/?l=bugtraq&m=108369640424244&w=2
来源:TRUSTIX
链接:http://www.trustix.org/errata/2004/0017
受影响实体
- Apache Http_server:2.0.35<!--2000-1-1-->
- Apache Http_server:2.0.36<!--2000-1-1-->
- Apache Http_server:2.0.37<!--2000-1-1-->
- Apache Http_server:2.0.48<!--2000-1-1-->
- Apache Http_server:2.0.47<!--2000-1-1-->
补丁
- Apache 安全漏洞的修复措施<!--2004-3-29-->
还没有评论,来说两句吧...