• 我的位置:
  • 首页
  • -
  • 漏洞预警
  • -
  • 中间件
  • -
  • Apache HTTP Server 缓冲区错误漏洞
    • CNNVD编号:CNNVD-202008-281
    • 危害等级: 超危 
    • CVE编号:CVE-2020-11984
    • 漏洞类型: 缓冲区错误
    • 威胁类型:远程
    • 厂       商:未知
    • 漏洞来源: FX, Google Securit...
    • 发布时间:2020-08-07
    • 更新时间:2020-12-11

    漏洞简介

    Apache HTTP Server是美国阿帕奇软件(Apache Software)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。

    Apache HTTP Server 2.4.32版本至2.4.44版本中的mod_uwsgi存在缓冲区错误漏洞。攻击者可利用该漏洞获取信息并可能执行代码。

    漏洞公示

    目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

    https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490

    参考网站

    来源:MLIST

    链接:http://www.openwall.com/lists/oss-security/2020/08/08/9


    来源:httpd.apache.org%3E

    链接:httpd.apache.org%3E


    来源:MLIST

    链接:https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672@%3Cdev.


    来源:MLIST

    链接:http://www.openwall.com/lists/oss-security/2020/08/08/8


    来源:FEDORA

    链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/


    来源:DEBIAN

    链接:https://www.debian.org/security/2020/dsa-4757


    来源:GENTOO

    链接:https://security.gentoo.org/glsa/202008-04


    来源:SUSE

    链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html


    来源:SUSE

    链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html


    来源:MISC

    链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html


    来源:MLIST

    链接:http://www.openwall.com/lists/oss-security/2020/08/08/10


    来源:usn.ubuntu.com

    链接:https://usn.ubuntu.com/4458-1/


    来源:MLIST

    链接:https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1@%3Cdev.


    来源:MLIST

    链接:http://www.openwall.com/lists/oss-security/2020/08/10/5


    来源:CONFIRM

    链接:https://security.netapp.com/advisory/ntap-20200814-0005/


    来源:httpd.apache.org

    链接:httpd.apache.org/security/vulnerabilities_24.html


    来源:MLIST

    链接:http://www.openwall.com/lists/oss-security/2020/08/17/2


    来源:nvd.nist.gov

    链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11984


    来源:packetstormsecurity.com

    链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html


    来源:www.auscert.org.au

    链接:https://www.auscert.org.au/bulletins/ESB-2020.2988/


    来源:www.auscert.org.au

    链接:https://www.auscert.org.au/bulletins/ESB-2020.2735/


    来源:packetstormsecurity.com

    链接:https://packetstormsecurity.com/files/158864/Ubuntu-Security-Notice-USN-4458-1.html


    来源:www.auscert.org.au

    链接:https://www.auscert.org.au/bulletins/ESB-2020.2903/


    来源:packetstormsecurity.com

    链接:https://packetstormsecurity.com/files/158801/Gentoo-Linux-Security-Advisory-202008-04.html


    来源:www.auscert.org.au

    链接:https://www.auscert.org.au/bulletins/ESB-2020.2806/


    来源:httpd-buffer-overflow-via-mod-proxy-uwsgi-33036

    链接:httpd-buffer-overflow-via-mod-proxy-uwsgi-33036


    来源:vigilance.fr

    链接:https://vigilance.fr/vulnerability/Apache-


    来源:www.auscert.org.au

    链接:https://www.auscert.org.au/bulletins/ESB-2020.2961/

    受影响实体

    暂无