PatchLink Update Server ‘Proxyreg.ASP’认证绕过漏洞

漏洞信息详情

PatchLink Update Server ‘Proxyreg.ASP’认证绕过漏洞

漏洞简介

FastPatch for (a) PatchLink Update Server (PLUS) 6.1 P1之前版本及 6.2 SR1 P1之前的6.2.x版本, 以及(b) Novell ZENworks 6.2 SR1及之前版本的FastPatch对dagent/proxyreg.asp不要求认证。远程攻击者可以借助修改的 (1) List, (2) Proxy, 或 (3) Delete 参数,列出、添加或删除PatchLink Distribution Point (PDP) 代理服务器。

漏洞公告

参考网址

来源: VUPEN

名称: ADV-2006-2596

链接:http://www.frsirt.com/english/advisories/2006/2596

来源: VUPEN

名称: ADV-2006-2595

链接:http://www.frsirt.com/english/advisories/2006/2595

来源: SECTRACK

名称: 1016405

链接:http://securitytracker.com/id?1016405

来源: SECUNIA

名称: 20878

链接:http://secunia.com/advisories/20878

来源: SECUNIA

名称: 20876

链接:http://secunia.com/advisories/20876

来源: BUGTRAQ

名称: 20060629 Multiple Vulnerabilities in PatchLink Update Server 6

链接:http://www.securityfocus.com/archive/1/archive/1/438710/100/0/threaded

来源: BID

名称: 18723

链接:http://www.securityfocus.com/bid/18723

来源: SREASON

名称: 1200

链接:http://securityreason.com/securityalert/1200

来源: FULLDISC

名称: 20060629 Multiple Vulnerabilities in PatchLink Update Server 6

链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享