Apache Web Server 安全漏洞

漏洞信息详情

Apache Web Server 安全漏洞

漏洞简介

Apache是一款广泛使用的开放源代码WEB服务程序。Apache的对默认错误页面的处理存在问题,攻击者可以利用此漏洞执行跨站脚本攻击。起因是没有正确的过滤SSI错误页面的恶意HTML代码。攻击者可以利用这个漏洞在访问恶意链接的客户端执行HTML和脚本代码,导致控制Web内容或窃取基于cookie的认证凭证。请注意仅在UseCanonicalName设置为Off且服务器运行在使用了通配符DNS的域中的情况下才可能利用这个漏洞。

漏洞公告

厂商补丁:

Apache Group

————

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:


http://www.apache.org/dist/httpd/apache_1.3.27.tar.gz” target=”_blank”>


http://www.apache.org/dist/httpd/apache_1.3.27.tar.gz

参考网址

来源:httpd.apache.org%3E

链接:httpd.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.

来源:ENGARDE

链接:http://www.linuxsecurity.com/advisories/other_advisory-2414.html

来源:MANDRAKE

链接:http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.php

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/10241

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2002-248.html

来源:MLIST

链接:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2002-222.html

来源:BUGTRAQ

链接:http://marc.info/?l=bugtraq&m=103376585508776&w=2

来源:BUGTRAQ

链接:http://marc.info/?l=bugtraq&m=103357160425708&w=2

来源:OSVDB

链接:http://www.osvdb.org/862

来源:MLIST

链接:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.

来源:CONECTIVA

链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530

来源:CONFIRM

链接:http://www.apacheweek.com/issues/02-10-04

来源:CERT-VN

链接:http://www.kb.cert.org/vuls/id/240329

来源:DEBIAN

链接:https://www.debian.org/security/2002/dsa-195

来源:MLIST

链接:https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.

来源:MLIST

链接:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.

来源:BID

链接:https://www.securityfocus.com/bid/5847

来源:VULNWATCH

链接:http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0003.html

来源:MLIST

链接:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.

来源:HP

链接:http://online.securityfocus.com/advisories/4617

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2002-243.html

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2002-251.html

来源:MLIST

链接:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.

来源:DEBIAN

链接:https://www.debian.org/security/2002/dsa-188

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2002-244.html

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2003-106.html

来源:DEBIAN

链接:https://www.debian.org/security/2002/dsa-187

来源:httpd-announce&m=103367938230488&w=2

链接:httpd-announce&m=103367938230488&w=2

来源:CONFIRM

链接:http://marc.info/?l=apache-

来源:MLIST

链接:https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.

来源:BUGTRAQ

链接:http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享