Apache 安全漏洞

漏洞信息详情

Apache 安全漏洞

漏洞简介

Apache 2.0.42之前版本的mod_dav不能正确处理版本控制钩。远程攻击者借助preforked多进程模型的空解引用导致服务拒绝(CPU消耗)注销子程序。

漏洞公告

The vendor has addressed this issue in version v2.0.42:

Apache Software Foundation Apache 2.0

Apache Software Foundation Apache 2.0.28

Apache Software Foundation Apache 2.0.32

Apache Software Foundation Apache 2.0.35

Apache Software Foundation Apache 2.0.36

Apache Software Foundation Apache 2.0.37

Apache Software Foundation Apache 2.0.38

Apache Software Foundation Apache 2.0.39

Apache Software Foundation Apache 2.0.40

Apache Software Foundation Apache 2.0.41

参考网址

来源:httpd.apache.org%3E

链接:httpd.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.

来源:BID

链接:https://www.securityfocus.com/bid/5816

来源:MLIST

链接:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.

来源:httpd

链接:httpd/CHANGES_2.0

来源:CONFIRM

链接:http://www.apache.org/dist/

来源:MLIST

链接:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.

来源:SECTRACK

链接:http://securitytracker.com/id?1005285

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/10208

来源:CERT-VN

链接:http://www.kb.cert.org/vuls/id/406121

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享