升級OpenSSH、Apache Httpd伺服器即可解決
OpenSSHVersion: 6.4 Port 22
Apache httpdVersion: 2.4.6 Port 80
5353
udp
mdns
Apache Tomcat/Coyote JSP engineVersion: 1.1 port 8080
City | San Francisco |
---|---|
Country | United States |
Organization | Digital Ocean |
ISP | Digital Ocean |
Last Update | 2020-03-23T08:36:39.705941 |
Hostnames | yp.findcpa.com.tw |
ASN | AS14061 |
Web Technologies
Vulnerabilities
Note: the device may not be impacted
by all of these issues. The vulnerabilities are implied based on the software
and version.
CVE-2014-0117
|
The mod_proxy module in
the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled,
allows remote attackers to cause a denial of service (child-process crash)
via a crafted HTTP Connection header.
|
CVE-2017-15906
|
The process_open function
in sftp-server.c in OpenSSH before 7.6 does not properly prevent write
operations in readonly mode, which allows attackers to create zero-length
files.
|
CVE-2014-0118
|
The deflate_in_filter
function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server
before 2.4.10, when request body decompression is enabled, allows remote
attackers to cause a denial of service (resource consumption) via crafted
request data that decompresses to a much larger size.
|
CVE-2016-0736
|
In Apache HTTP Server
versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie
using the configured ciphers with possibly either CBC or ECB modes of
operation (AES256-CBC by default), hence no selectable or builtin
authenticated encryption. This made it vulnerable to padding oracle attacks,
particularly with CBC.
|
CVE-2015-3185
|
The ap_some_auth_required
function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14
does not consider that a Require directive may be associated with an
authorization setting rather than an authentication setting, which allows
remote attackers to bypass intended access restrictions in opportunistic
circumstances by leveraging the presence of a module that relies on the 2.2
API behavior.
|
CVE-2015-3184
|
mod_authz_svn in Apache
Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache
httpd 2.4.x, does not properly restrict anonymous access, which allows remote
anonymous users to read hidden files via the path name.
|
CVE-2018-1312
|
In Apache httpd 2.2.0 to
2.4.29, when generating an HTTP Digest authentication challenge, the nonce
sent to prevent reply attacks was not correctly generated using a
pseudo-random seed. In a cluster of servers using a common Digest
authentication configuration, HTTP requests could be replayed across servers
by an attacker without detection.
|
CVE-2014-0098
|
The log_cookie function in
mod_log_config.c in the mod_log_config module in the Apache HTTP Server
before 2.4.8 allows remote attackers to cause a denial of service
(segmentation fault and daemon crash) via a crafted cookie that is not
properly handled during truncation.
|
CVE-2016-0778
|
The (1) roaming_read and
(2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x,
6.x, and 7.x before 7.1p2, when certain proxy and forward options are
enabled, do not properly maintain connection file descriptors, which allows
remote servers to cause a denial of service (heap-based buffer overflow) or
possibly have unspecified other impact by requesting many forwardings.
|
CVE-2014-2532
|
sshd in OpenSSH before 6.6
does not properly support wildcards on AcceptEnv lines in sshd_config, which
allows remote attackers to bypass intended environment restrictions by using
a substring located before a wildcard character.
|
CVE-2016-8612
|
Apache HTTP Server
mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input
Validation in the protocol parsing logic in the load balancer resulting in a
Segmentation Fault in the serving httpd process.
|
CVE-2014-0226
|
Race condition in the
mod_status module in the Apache HTTP Server before 2.4.10 allows remote
attackers to cause a denial of service (heap-based buffer overflow), or
possibly obtain sensitive credential information or execute arbitrary code,
via a crafted request that triggers improper scoreboard handling within the
status_handler function in modules/generators/mod_status.c and the
lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
|
CVE-2014-1692
|
The hash_buffer function
in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable
the J-PAKE protocol, does not initialize certain data structures, which might
allow remote attackers to cause a denial of service (memory corruption) or
have unspecified other impact via vectors that trigger an error condition.
|
CVE-2014-2653
|
The verify_host_key
function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows
remote servers to trigger the skipping of SSHFP DNS RR checking by presenting
an unacceptable HostCertificate.
|
CVE-2014-3523
|
Memory leak in the
winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the
Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default
AcceptFilter is enabled, allows remote attackers to cause a denial of service
(memory consumption) via crafted requests.
|
CVE-2017-15710
|
In Apache httpd 2.0.23 to
2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured
with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup
the right charset encoding when verifying the user's credentials. If the
header value is not present in the charset conversion table, a fallback
mechanism is used to truncate it to a two characters value to allow a quick
retry (for example, 'en-US' is truncated to 'en'). A header value of less
than two characters forces an out of bound write of one NUL byte to a memory
location that is not part of the string. In the worst case, quite unlikely,
the process would crash which could be used as a Denial of Service attack. In
the more likely case, this memory is already reserved for future use and the
issue has no effect at all.
|
CVE-2017-15715
|
In Apache httpd 2.4.0 to
2.4.29, the expression specified in <FilesMatch> could match '$' to a
newline character in a malicious filename, rather than matching only the end
of the filename. This could be exploited in environments where uploads of
some files are are externally blocked, but only by matching the trailing
portion of the filename.
|
CVE-2013-6438
|
The dav_xml_get_cdata
function in main/util.c in the mod_dav module in the Apache HTTP Server
before 2.4.8 does not properly remove whitespace characters from CDATA
sections, which allows remote attackers to cause a denial of service (daemon
crash) via a crafted DAV WRITE request.
|
CVE-2017-7679
|
In Apache httpd 2.2.x
before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the
end of a buffer when sending a malicious Content-Type response header.
|
CVE-2018-17199
|
In Apache HTTP Server 2.4
release 2.4.37 and prior, mod_session checks the session expiry time before
decoding the session. This causes session expiry time to be ignored for
mod_session_cookie sessions since the expiry time is loaded when the session
is decoded.
|
CVE-2017-9788
|
In Apache httpd before
2.2.34 and 2.4.x before 2.4.27, the value placeholder in
[Proxy-]Authorization headers of type 'Digest' was not initialized or reset
before or between successive key=value assignments by mod_auth_digest.
Providing an initial key with no '=' assignment could reflect the stale value
of uninitialized pool memory used by the prior request, leading to leakage of
potentially confidential information, and a segfault in other cases resulting
in denial of service.
|
CVE-2014-8109
|
mod_lua.c in the mod_lua
module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not
support an httpd configuration in which the same Lua authorization provider
is used with different arguments within different contexts, which allows
remote attackers to bypass intended access restrictions in opportunistic
circumstances by leveraging multiple Require directives, as demonstrated by a
configuration that specifies authorization for one group to access a certain
directory, and authorization for a second group to access a second directory.
|
CVE-2016-10708
|
sshd in OpenSSH before 7.4
allows remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) via an out-of-sequence NEWKEYS message, as
demonstrated by Honggfuzz, related to kex.c and packet.c.
|
CVE-2017-9798
|
Apache httpd allows remote
attackers to read secret data from process memory if the Limit directive can
be set in a user's .htaccess file, or if httpd.conf has certain
misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server
through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an
unauthenticated OPTIONS HTTP request when attempting to read secret data.
This is a use-after-free issue and thus secret data is not always sent, and
the specific data depends on many factors including configuration.
Exploitation with .htaccess can be blocked with a patch to the
ap_limit_section function in server/core.c.
|
CVE-2016-2161
|
In Apache HTTP Server
versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the
server to crash, and each instance continues to crash even for subsequently
valid requests.
|
CVE-2018-15919
|
Remotely observable
behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote
attackers to detect existence of users on a target system when GSS2 is in
use. NOTE: the discoverer states 'We understand that the OpenSSH developers
do not want to treat such a username enumeration (or "oracle") as a
vulnerability.'
|
CVE-2014-0231
|
The mod_cgid module in the
Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which
allows remote attackers to cause a denial of service (process hang) via a
request to a CGI script that does not read from its stdin file descriptor.
|
CVE-2013-4352
|
The cache_invalidate
function in modules/cache/cache_storage.c in the mod_cache module in the
Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows
remote HTTP servers to cause a denial of service (NULL pointer dereference
and daemon crash) via vectors that trigger a missing hostname value.
|
CVE-2019-0220
|
A vulnerability was found
in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request
URL contains multiple consecutive slashes ('/'), directives such as
LocationMatch and RewriteRule must account for duplicates in regular
expressions while other aspects of the servers processing will implicitly
collapse them.
|
CVE-2016-4975
|
Possible CRLF injection
allowing HTTP response splitting attacks for sites which use mod_userdir.
This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit
CR or LF injection into the "Location" or other outbound header key
or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed
in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
|
CVE-2018-1283
|
In Apache httpd 2.4.0 to
2.4.29, when mod_session is configured to forward its session data to CGI
applications (SessionEnv on, not the default), a remote user may influence
their content by using a "Session" header. This comes from the
"HTTP_SESSION" variable name used by mod_session to forward its
data to CGIs, since the prefix "HTTP_" is also used by the Apache
HTTP Server to pass HTTP header fields, per CGI specifications.
|
CVE-2016-0777
|
The resend_bytes function
in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2
allows remote servers to obtain sensitive information from process memory by
requesting transmission of an entire buffer, as demonstrated by reading a private
key.
|
CVE-2016-8743
|
Apache HTTP Server, in all
releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted
from requests and sent in response lines and headers. Accepting these
different behaviors represented a security concern when httpd participates in
any chain of proxies or interacts with back-end application servers, either
through mod_proxy or using conventional CGI mechanisms, and may result in
request smuggling, response splitting and cache pollution.
|
沒有留言:
張貼留言
注意:只有此網誌的成員可以留言。