APSIS Pound远程格式字符串漏洞

漏洞信息详情

APSIS Pound远程格式字符串漏洞

漏洞简介

Pound 1.5及之前版本的svc.c中的logmsg函数存在格式字符串漏洞。远程攻击者可以借助系统记录消息中的格式字符串说明符执行任意代码。

漏洞公告

The vendor has released an upgrade to address this issue:
Gentoo Linux has released an advisory (GLSA 200405-08) that addresses this issue. Please see the referenced advisory for further information. It is advised that administrators execute as superuser to update Pound:
emerge sync
emerge -pv “>=net-www/pound-1.6”
emerge “>=net-www/pound-1.6”
APSIS Pound 1.5

参考网址

来源: BID
名称: 10267
链接:http://www.securityfocus.com/bid/10267

来源: GENTOO
名称: GLSA-200405-08
链接:http://security.gentoo.org/glsa/glsa-200405-08.xml

来源: SECUNIA
名称: 11528
链接:http://secunia.com/advisories/11528

来源: XF
名称: pound-logmsg-format-string(16033)
链接:http://xforce.iss.net/xforce/xfdb/16033

来源: OSVDB
名称: 5746
链接:http://www.osvdb.org/5746

来源: www.apsis.ch
链接:http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000

来源: SECTRACK
名称: 1010034
链接:http://securitytracker.com/id?1010034

来源: FULLDISC
名称: 20040507 Pound <=1.5 Remote Exploit (Format string bug)
链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0343.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享