漏洞信息详情
WWW-SQL Include命令远程缓冲区溢出漏洞
- CNNVD编号:CNNVD-200412-038
- 危害等级: 超危
![图片[1]-WWW-SQL Include命令远程缓冲区溢出漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-17/c4e67a37c54aee8c0e1983d8333a9158.png)
- CVE编号:
CVE-2004-0455
- 漏洞类型:
边界条件错误
- 发布时间:
2004-06-21
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
- 漏洞来源:
Debian Security Ad… -
漏洞简介
www-sql是一款能在HTML嵌入SQL语句,生成动态WEB页的工具。
www-sql包含的include命令实现存在缓冲区溢出,远程攻击者可以利用这个漏洞可能以进程权限在系统上执行任意指令。
主要问题存在于对用户提供的字符串,拷贝到堆栈缓冲区时缺少充分缓冲区边界检查,精心构建提交数据可能以进程权限在系统上执行任意指令。
漏洞公告
厂商补丁:
Debian
——
Debian系统补丁下载:
Debian GNU/Linux 3.0 alias woody
– ——————————–
Source archives:
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc
Size/MD5 checksum: 623 830be25aad38186b4178ce5ff424d796
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz
Size/MD5 checksum: 5651 17f259d168cb7d620c125d5d7cc3a311
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz
Size/MD5 checksum: 144332 96aaae705c711c4af723c6646a48c301
Alpha architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb
Size/MD5 checksum: 47508 453ee924cde1a11376a4502995670e8e
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb
Size/MD5 checksum: 48472 e1652f6b7d2454a7e1288874821a09e1
ARM architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb
Size/MD5 checksum: 42002 4254ca5e05d673c1d73c4f9ed73ed126
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb
Size/MD5 checksum: 42338 404e674c59182c200b9693d80289b752
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb
Size/MD5 checksum: 41446 28de214d36809a8ed88484d65a290619
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb
Size/MD5 checksum: 41798 3cdd4a39f99a88b4ee868c7be8e051fc
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb
Size/MD5 checksum: 53050 8d8caceeb1843afef110dba1f94f91bb
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb
Size/MD5 checksum: 53524 b5e42ce7363e4617fe88a05fc1dd048e
HP Precision architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb
Size/MD5 checksum: 45330 a0da3671f82ebd5c4dac0ff894463021
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb
Size/MD5 checksum: 45796 6729114cc8e92fa1b278ccf619370f50
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb
Size/MD5 checksum: 40222 0af8912f6629243e49f71b520c9522c1
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb
Size/MD5 checksum: 40542 edb269316ec27e7f73bb801e0bb74c00
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb
Size/MD5 checksum: 45190 eba2210f7bbfb019d7a4dacb40e69460
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb
Size/MD5 checksum: 45438 ee92959d93a961dcd431a7b917677aef
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb
Size/MD5 checksum: 45154 409d7105da9c8ad1f6058d5ac9afa3e1
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb
Size/MD5 checksum: 45396 3c546d9fb0bd4a8e9d7cf49170548025
PowerPC architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb
Size/MD5 checksum: 43308 c28b6434bd49223dad7d0b66dfcadc2b
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb
Size/MD5 checksum: 43590 99ac9c623aeca76c3ff11c5396dc0cd6
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb
S
参考网址
来源: XF
名称: wwwsql-cgi-command-execution(16455)
链接:http://xforce.iss.net/xforce/xfdb/16455
来源: BID
名称: 10577
链接:http://www.securityfocus.com/bid/10577
来源: DEBIAN
名称: DSA-523
链接:http://www.debian.org/security/2004/dsa-523




















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)