arpwatch 安全绕过漏洞

漏洞信息详情

arpwatch 安全绕过漏洞

漏洞简介

使用在Red Hat,Debian,Fedora及可能其他平台的arpwatch 2.1a15版本中存在远程安全绕过漏洞。攻击者可利用该漏洞绕过某些安全限制进而执行未授权操作。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://www.powerdns.com/

参考网址

来源: MLIST

名称: [oss-security] 20120525 Re: CVE Request: powerdns does not clear supplementary groups

链接:http://www.openwall.com/lists/oss-security/2012/05/25/5

来源: MLIST

名称: [oss-security] 20120524 Re: CVE Request: powerdns does not clear supplementary groups

链接:http://www.openwall.com/lists/oss-security/2012/05/24/14

来源: MLIST

名称: [oss-security] 20120525 Re: CVE Request: powerdns does not clear supplementary groups

链接:http://www.openwall.com/lists/oss-security/2012/05/24/13

来源: MLIST

名称: [oss-security] 20120524 Re: CVE Request: powerdns does not clear supplementary groups

链接:http://www.openwall.com/lists/oss-security/2012/05/24/12

来源: DEBIAN

名称: DSA-2481

链接:http://www.debian.org/security/2012/dsa-2481

来源: FEDORA

名称: FEDORA-2012-8675

链接:http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082569.html

来源: FEDORA

名称: FEDORA-2012-8702

链接:http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082565.html

来源: FEDORA

名称: FEDORA-2012-8677

链接:http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082553.html

来源:SECUNIA

名称:49362

链接:http://secunia.com/advisories/49362

来源: BID

名称: 54157

链接:http://www.securityfocus.com/bid/54157

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享