ht://dig远程命令执行漏洞

漏洞信息详情

ht://dig远程命令执行漏洞

漏洞简介

Htdig存在漏洞。远程攻击者可以借助带有shell元字符的文件执行命令。

漏洞公告

Debian GN/Linux:
Debian GNU/Linux 2.1 alias slink
—————————–
This version of Debian was released only for Intel ia32, the Motorola
680×0, the alpha and the Sun sparc architecture.
Source archives:
http://security.debian.org/dists/stable/updates/source/htdig_3.1.2-4slink6.diff.gz
MD5 checksum: 9151d7e15d7a2759958c09e6c21f28de
http://security.debian.org/dists/stable/updates/source/htdig_3.1.2-4slink6.dsc
MD5 checksum: fc05d22813afaa9fce10e97a5437ed69
http://security.debian.org/dists/stable/updates/source/htdig_3.1.2.orig.tar.gz
MD5 checksum: ddd0305d420e2d6025694d4e1448d5f7
Alpha architecture:
http://security.debian.org/dists/stable/updates/binary-alpha/htdig_3.1.2-4slink6_alpha.deb
MD5 checksum: 1f816b0af2dd5919524d26be2017ec62
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/binary-i386/htdig_3.1.2-4slink6_i386.deb
MD5 checksum: da77c99388d3d9d09afecb2c9f345d58
Motorola 680×0 architecture:
http://security.debian.org/dists/stable/updates/binary-m68k/htdig_3.1.2-4slink6_m68k.deb
MD5 checksum: 48986e8f5323db7b899c6341b87c3d4d
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/binary-sparc/htdig_3.1.2-4slink6_sparc.deb
MD5 checksum: fcd3181ad76a72e82db2f769d88ff18c
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

参考网址

来源: BID
名称: 867
链接:http://www.securityfocus.com/bid/867

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享