漏洞信息详情
RedHat Interchange远程泄漏任意文件漏洞
- CNNVD编号:CNNVD-200209-012
- 危害等级: 中危
- CVE编号:
CVE-2002-0874
- 漏洞类型:
未知
- 发布时间:
2002-08-13
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
redhat - 漏洞来源:
Mike Heins※ mike@p… -
漏洞简介
Interchange是一套电子商务和应用服务器系统。该系统可用于构建一个基于数据库的Web服务器以及在线应用。
Interchange 4.8.5以及更低版本中存在一个安全漏洞,当它运行在\”INET mode\”方式时,允许攻击者读取任意Interchange进程有权读取的文件,这可能泄漏给攻击者一些敏感信息,攻击者可能利用这些信息发动进一步攻击。
漏洞公告
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-150-1)以及相应补丁:
DSA-150-1:New interchange packages fix illegal file exposition
链接:http://www.debian.org/security/2002/dsa-150” target=”_blank”>
http://www.debian.org/security/2002/dsa-150
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1.dsc
Size/MD5 checksum: 883 ffa49ff2144a7bd4320eb9c2198d24b3
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1.diff.gz
Size/MD5 checksum: 528 60c7cb2c1798ae2f61365e130d1772d3
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306.orig.tar.gz
Size/MD5 checksum: 1858749 660c7e65732a052a81d2ae6e4c6ed2b5
Architecture independent components:
http://security.debian.org/pool/updates/main/i/interchange/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb
Size/MD5 checksum: 635062 6ebceb949aad1dc23e364dd297125c8f
http://security.debian.org/pool/updates/main/i/interchange/interchange-ui_4.8.3.20020306-1.woody.1_all.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange-ui_4.8.3.20020306-1.woody.1_all.deb
Size/MD5 checksum: 432068 3f9574521ced0bc39c40793c74841947
Alpha architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_alpha.deb
Size/MD5 checksum: 856324 a903c5f415978bda83ebc64e533d6513
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb
Size/MD5 checksum: 13812 21dcdb083b2d93e8b72cb06e3b9b3d77
ARM architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_arm.deb
Size/MD5 checksum: 854980 80a5246531dc085d5ef629dd1337271c
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb
Size/MD5 checksum: 13198 63fe3b689099793c61b2bbb870c101e3
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_i386.deb
Size/MD5 checksum: 852744 7a40058ecc9119c740826b3dbc9660d0
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb
Size/MD5 checksum: 13156 234c7d614aa28de64d5d33dcb49e654d
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_ia64.deb
Size/MD5 checksum: 858420 6f16f350d5d162b2bbac98bb4e7dc857
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb
Size/MD5 checksum: 15670 fcfacf2758ac97a9ee6390bf20b9f64b
HP Precision architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_hppa.deb
Size/MD5 checksum: 856104 4d7932a5d476acf49eda3ca2ecc4bf89
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb
Size/MD5 checksum: 13920 a4593d918b5c9c87434544ed7d0af579
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_m68k.deb
Size/MD5 checksum: 855146 de6a211e1b615dded617c9ff9877b897
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb
Size/MD5 checksum: 13168 fda641d6355b9141fc2afde7b87c95c0
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_mips.deb
Size/MD5 checksum: 855866 75c9d826ef0c1352b3a035d22d0867cf
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb
Size/MD5 checksum: 13236 4abca0332cc562ee5a624c8eb15cfa5f
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_mipsel.deb
Size/MD5 checksum: 855776 3d9df00fd5fb6bee01222e9e263edc66
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb
Size/MD5 checksum: 13238 59556c80240d01d47bfba36b20e5c34b
PowerPC architecture:
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/interchange_4.8.3.20020306-1.woody.1_powerpc.deb
Size/MD5 checksum: 855224 2b0bb6d175fbe6194ef1b05c14069fcc
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/i/interchange/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb
Size/MD5 checksum: 13140 ff191322a2afd7b6bae94613
参考网址
来源: DEBIAN
名称: DSA-150
链接:http://www.debian.org/security/2002/dsa-150