首页 -> 安全研究

安全研究

安全漏洞
Apache mod_auth畸形密码内存破坏漏洞

发布日期:2004-04-24
更新日期:2004-04-30

受影响系统:
Apache Software Foundation Apache 2.0a9
Apache Software Foundation Apache 2.0.49
Apache Software Foundation Apache 2.0.48
Apache Software Foundation Apache 2.0.47
Apache Software Foundation Apache 2.0.46
Apache Software Foundation Apache 2.0.45
Apache Software Foundation Apache 2.0.44
Apache Software Foundation Apache 2.0.43
Apache Software Foundation Apache 2.0.42
Apache Software Foundation Apache 2.0.41
Apache Software Foundation Apache 2.0.40
Apache Software Foundation Apache 2.0.39
Apache Software Foundation Apache 2.0.38
Apache Software Foundation Apache 2.0.37
Apache Software Foundation Apache 2.0.36
Apache Software Foundation Apache 2.0.35
Apache Software Foundation Apache 2.0.32
Apache Software Foundation Apache 2.0.28
Apache Software Foundation Apache 2.0
Apache Software Foundation Apache 1.3.29
Apache Software Foundation Apache 1.3.28
Apache Software Foundation Apache 1.3.26
Apache Software Foundation Apache 1.3.25
Apache Software Foundation Apache 1.3.24
Apache Software Foundation Apache 1.3.23
Apache Software Foundation Apache 1.3.22
Apache Software Foundation Apache 1.3.20
Apache Software Foundation Apache 1.3.19
Apache Software Foundation Apache 1.3.18
Apache Software Foundation Apache 1.3.17
Apache Software Foundation Apache 1.3.14
Apache Software Foundation Apache 1.3.12
Apache Software Foundation Apache 1.3.11
Apache Software Foundation Apache 1.3
Apache Software Foundation Apache 1.0
Apache Software Foundation Apache 0.8.14
Apache Software Foundation Apache 0.8.11
Apache Software Foundation Apache 1.3.27
    - Debian Linux 3.0
    - HP HP-UX 11.04
    - OpenBSD 3.3
    - RedHat Enterprise Linux WS 2.1
    - RedHat Enterprise Linux ES 2.1
    - RedHat Enterprise Linux AS 2.1
    - SGI IRIX 6.5.19
    - SuSE Linux 8.2
    - SuSE Linux 8.1
描述:
BUGTRAQ  ID: 10212

Apache是一款开放源代码流行的Httpd服务程序。

Apache在验证过程中解析畸形密码存在内存破坏问题,远程攻击者可以利用这个漏洞对WEB服务程序进行拒绝服务攻击或可能以进程权限在系统上执行任意指令。

问题存在于Apache的验证模块中(mod_auth, mod_auth3, mod_auth4),如果在16-bit和64-bit系统中,当sizeof( unsigned long )!=4时,可导致函数ebcdic2ascii()内存破坏,造成服务系统崩溃,存在执行任意指令可能。

<*来源:Adam Zabrocki (pi3ki31ny@wp.pl
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108284108419957&w=2
*>

建议:
厂商补丁:

Apache Software Foundation
--------------------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.apache.org/

浏览次数:4645
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障