CVE编号
CVE-2020-8927利用情况
暂无补丁情况
官方补丁披露时间
2020-09-15漏洞描述
brotli Library是谷歌(google)的一种数据压缩算法的扩展库使用 LZ77 算法、赫夫曼编码和二阶上下文建模的现代变体组合来压缩数据,其压缩比可与目前可用的最佳通用压缩方法相媲美。 Brotli library 1.0.8之前存在缓冲区错误漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/google/brotli/releases/tag/v1.0.9
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html | |
https://github.com/google/brotli/releases/tag/v1.0.9 | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://usn.ubuntu.com/4568-1/ | |
https://www.debian.org/security/2020/dsa-4801 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | brotli | * |
Up to (excluding) 1.0.8 |
||||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | brotli | * |
Up to (excluding) 1.0.9-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | brotli | * |
Up to (excluding) 1.0.9-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | brotli | * |
Up to (excluding) 1.0.9-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | brotli | * |
Up to (excluding) 1.0.9-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | brotli | * |
Up to (excluding) 1.0.9-r0 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | brotli | * |
Up to (excluding) 1.0.6-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | brotli | * |
Up to (excluding) 1.0.7-2+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | brotli | * |
Up to (excluding) 0.5.2+dfsg-2+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | brotli | * |
Up to (excluding) 1.0.1-1.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_32 | brotli | * |
Up to (excluding) 1.0.1-1.fc32 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_33 | brotli | * |
Up to (excluding) 1.0.1-1.fc33 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_34 | brotli | * |
Up to (excluding) 3.1.417-1.fc34 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_35 | brotli | * |
Up to (excluding) 3.1.417-1.fc35 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_36 | brotli | * |
Up to (excluding) 3.1.417-1.fc36 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | brotli | * |
Up to (excluding) 1.0.9-lp152.2.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | brotli | * |
Up to (excluding) 1.0.7-3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | brotli | * |
Up to (excluding) 1.0.6-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | brotli | * |
Up to (excluding) 1.0.6-3.el8 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | brotli | * |
Up to (excluding) 1.0.3-1ubuntu1~16.04.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | brotli | * |
Up to (excluding) 1.0.3-1ubuntu1.3 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | brotli | * |
Up to (excluding) 1.0.7-6ubuntu0.1 |
|||||
运行在以下环境 | |||||||||
系统 | unionos_20 | brotli | * |
Up to (excluding) 1.0.7-2+deb10u1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...