CVE编号
CVE-2020-8517利用情况
暂无补丁情况
官方补丁披露时间
2020-02-05漏洞描述
Squid是一种流行的开源Internet代理和Web缓存应用程序。Squid 4.10之前版本由于输入验证不正确,ext_lm_group_acl中的NTLM身份验证凭证解析器存在缓冲区溢出漏洞,可能导致拒绝服务。<br>解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html | |
http://www.squid-cache.org/Advisories/SQUID-2020_3.txt | |
http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582... | |
https://security.gentoo.org/glsa/202003-34 | |
https://security.netapp.com/advisory/ntap-20210304-0002/ | |
https://usn.ubuntu.com/4289-1/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | squid-cache | squid | * |
Up to (excluding) 4.10 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | squid | * |
Up to (excluding) 3.5.27-r4 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | squid | * |
Up to (excluding) 4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | squid | * |
Up to (excluding) 4.6-1+deb10u6 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | squid | * |
Up to (excluding) 3.5.23-5+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | squid | * |
Up to (excluding) 4.10-lp151.2.11.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | squid | * |
Up to (excluding) 3.5.21-26.20.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | squid | * |
Up to (excluding) 4.10-4.6.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | squid | * |
Up to (excluding) 3.5.12-1ubuntu7.10 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | squid | * |
Up to (excluding) 3.5.27-1ubuntu1.5 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | squid | * |
Up to (excluding) 4.9-2ubuntu4 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.04 | squid | * |
Up to (excluding) 4.9-2ubuntu4 |
|||||
运行在以下环境 | |||||||||
系统 | unionos_20 | squid | * |
Up to (excluding) 4.6.4-1+security |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...