CNNVD-ID编号 | CNNVD-202008-281 |
CVE编号 | CVE-2020-11984 |
发布时间 | 2020-08-07 |
更新时间 | 2021-01-20 |
漏洞类型 | 缓冲区错误 |
漏洞来源 | N/A |
危险等级 | 超危 |
威胁类型 | 远程 |
厂 商 | N/A |
Apache HTTP Server是美国阿帕奇软件(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。
Apache HTTP Server 2.4.32版本至2.4.44版本中的mod_uwsgi存在缓冲区错误漏洞。攻击者可利用该漏洞获取信息并可能执行代码。
目前厂商已发布升级了Apache HTTP Server 缓冲区错误漏洞的补丁,Apache HTTP Server 缓冲区错误漏洞的补丁获取链接:
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490
来源:MLIST
来源:httpd.apache.org%3E
来源:MLIST
来源:MLIST
来源:FEDORA
来源:DEBIAN
来源:GENTOO
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html
来源:MISC
链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html
来源:MLIST
来源:usn.ubuntu.com
来源:MLIST
来源:MLIST
来源:CONFIRM
来源:httpd.apache.org
来源:MLIST
来源:www.auscert.org.au
来源:www.oracle.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html
来源:www.auscert.org.au
来源:http-server
链接:http-server/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-rational-build-forge-security-advisory-for-apache-
来源:httpd-buffer-overflow-via-mod-proxy-uwsgi-33036
来源:vigilance.fr
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:www.oracle.com
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159753/Red-Hat-Security-Advisory-2020-4384-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158864/Ubuntu-Security-Notice-USN-4458-1.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158801/Gentoo-Linux-Security-Advisory-202008-04.html
来源:www.nsfocus.net
来源:www.auscert.org.au
暂无