CVE-2002-1568
CVSS5.0
发布时间 :2003-11-17 00:00:00
修订时间 :2016-10-17 22:27:13
NMCOS    

[原文]OpenSSL 0.9.6e uses assertions when detecting buffer overflow attacks instead of less severe mechanisms, which allows remote attackers to cause a denial of service (crash) via certain messages that cause OpenSSL to abort from a failed assertion, as demonstrated using SSLv2 CLIENT_MASTER_KEY messages, which are not properly handled in s2_srvr.c.


[CNNVD]OpenSSL SSLv2 Client_Master_Key远程拒绝服务漏洞(CNNVD-200311-080)

        OpenSSL 0.9.6e版本使用断言检测缓冲区溢出攻击而不是较少严重机制溢出攻击。远程攻击者借助致使OpenSSL中止失败断言的某些消息导致服务拒绝(崩溃),正如使用没有正确处理s2_srvr.c的SSLv2 CLIENT_MASTER_KEY消息。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1568
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1568
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200311-080
(官方数据源) CNNVD

- 其它链接及资源

http://cvs.openssl.org/chngview?cn=7659
(VENDOR_ADVISORY)  CONFIRM  http://cvs.openssl.org/chngview?cn=7659
http://marc.info/?l=bugtraq&m=106511018214983
(UNKNOWN)  BUGTRAQ  20031002 New OpenSSL remote vulnerability (issue date 2003/10/02)
http://www.ebitech.sk/patrik/SA/SA-20031002.txt
(UNKNOWN)  MISC  http://www.ebitech.sk/patrik/SA/SA-20031002.txt

- 漏洞信息

OpenSSL SSLv2 Client_Master_Key远程拒绝服务漏洞
中危 缓冲区溢出
2003-11-17 00:00:00 2005-10-20 00:00:00
远程  
        OpenSSL 0.9.6e版本使用断言检测缓冲区溢出攻击而不是较少严重机制溢出攻击。远程攻击者借助致使OpenSSL中止失败断言的某些消息导致服务拒绝(崩溃),正如使用没有正确处理s2_srvr.c的SSLv2 CLIENT_MASTER_KEY消息。

- 公告与补丁

        OpenSSL have reportedly addressed this issue in versions 0.9.6f and greater.
        Red Hat has reportedly addressed this issue in the RHSA-2003:291-11 advisory. See referenced advisory for further information relating to obtaining and applying fixes.
        Guardian Digital has released an advisory for EnGarde (ESA-20031003-028) to address this issue. Updates may be applied with the Guardian Digital WebTool. Further details may be found in the attached advisory.
        VMware has released fixes to address this issue. Please see the related web reference for more information.
        IBM has released fixes to address these issues in IBM HTTP Server.
        
        OpenSSL Project OpenSSL 0.9.6 d
        
        OpenSSL Project OpenSSL 0.9.6 c
        
        OpenSSL Project OpenSSL 0.9.6
        
        OpenSSL Project OpenSSL 0.9.6 b
        
        OpenSSL Project OpenSSL 0.9.6 e
        
        OpenSSL Project OpenSSL 0.9.6 a
        
        IBM HTTP Server 1.3.12 .7
        
        IBM HTTP Server 1.3.12 .2
        
        IBM HTTP Server 1.3.12 .6
        
        IBM HTTP Server 1.3.12 .1
        
        IBM HTTP Server 1.3.12 .3
        
        IBM HTTP Server 1.3.12
        
        IBM HTTP Server 1.3.12 .5
        
        IBM HTTP Server 1.3.12 .4
        
        IBM HTTP Server 1.3.19 .1
        
        IBM HTTP Server 1.3.19 .3
        
        IBM HTTP Server 1.3.19 .4
        
        IBM HTTP Server 1.3.19
        
        IBM HTTP Server 1.3.19 .5
        
        IBM HTTP Server 1.3.19 .2
        
        IBM HTTP Server 1.3.26
        
        IBM HTTP Server 1.3.26 .2
        
        IBM HTTP Server 1.3.26 .1
        
        IBM HTTP Server 1.3.28
        

- 漏洞信息

3944
OpenSSL SSLv2 Failed Assertion DoS
Local Access Required, Remote / Network Access Denial of Service, Input Manipulation
Loss of Availability
Exploit Public Vendor Verified

- 漏洞描述

OpenSSL contains a flaw that may allow a malicious remote user to crash OpenSSL. The issue is triggered when a specially crafted SSLv2 CLIENT_MASTER_KEY message is sent to the server. It is possible that the flaw may allow a crash of OpenSSL, resulting in a loss of availability.

- 时间线

2003-10-02 Unknow
2003-10-02 Unknow

- 解决方案

Upgrade to version 0.9.6f or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by disabling support for the SSLv2 protocol.

- 相关参考

- 漏洞作者

- 漏洞信息

OpenSSL SSLv2 Client_Master_Key Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 8746
Yes No
2003-10-02 12:00:00 2009-07-11 11:56:00
Discovery of this vulnerability has been credited to Patrik Hornik <patrik.hornik@ebitech.sk>.

- 受影响的程序版本

RedHat openssl096-0.9.6-6.i386.rpm
+ RedHat Linux 7.2 i386
RedHat openssl096-0.9.6-6.i386.rpm
+ RedHat Linux 7.3 i386
RedHat openssl096-0.9.6-11.i386.rpm
+ RedHat Linux 8.0 i386
RedHat openssl095a-0.9.5a-16.i386.rpm
+ RedHat Linux 8.0 i386
RedHat openssl095a-0.9.5a-11.i386.rpm
+ RedHat Linux 7.2 i386
RedHat openssl095a-0.9.5a-11.i386.rpm
+ RedHat Linux 7.3 i386
RedHat openssl-python-0.9.6-3.i386.rpm
+ RedHat Linux 7.1 i386
RedHat openssl-python-0.9.5a-14.i386.rpm
+ RedHat Linux 7.0 i386
RedHat openssl-perl-0.9.6b-8.i386.rpm
+ RedHat Linux 7.2 i386
RedHat openssl-perl-0.9.6b-29.i386.rpm
+ RedHat Linux 8.0 i386
RedHat openssl-perl-0.9.6b-18.i386.rpm
+ RedHat Linux 7.3 i386
RedHat openssl-perl-0.9.6-3.i386.rpm
+ RedHat Linux 7.1 i386
RedHat openssl-perl-0.9.5a-14.i386.rpm
+ RedHat Linux 7.0 i386
RedHat openssl-devel-0.9.6b-8.i386.rpm
+ RedHat Linux 7.2 i386
RedHat openssl-devel-0.9.6b-29.i386.rpm
+ RedHat Linux 8.0 i386
RedHat openssl-devel-0.9.6b-18.i386.rpm
+ RedHat Linux 7.3 i386
RedHat openssl-devel-0.9.6-3.i386.rpm
+ RedHat Linux 7.1 i386
RedHat openssl-devel-0.9.5a-14.i386.rpm
+ RedHat Linux 7.0 i386
RedHat openssl-0.9.6b-8.i386.rpm
+ RedHat Linux 7.2 i386
RedHat openssl-0.9.6b-29.i386.rpm
+ RedHat Linux 8.0 i386
RedHat openssl-0.9.6b-18.i386.rpm
+ RedHat Linux 7.3 i386
RedHat openssl-0.9.6-3.i386.rpm
+ RedHat Linux 7.1 i386
RedHat openssl-0.9.5a-14.i386.rpm
+ RedHat Linux 7.0 i386
OpenSSL Project OpenSSL 0.9.6 e
+ FreeBSD FreeBSD 4.6 -RELEASE
+ FreeBSD FreeBSD 4.6
OpenSSL Project OpenSSL 0.9.6 d
+ Slackware Linux 8.1
OpenSSL Project OpenSSL 0.9.6 c
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2
+ S.u.S.E. Linux 8.0 i386
+ S.u.S.E. Linux 8.0
OpenSSL Project OpenSSL 0.9.6 b
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ OpenBSD OpenBSD 3.1
+ OpenBSD OpenBSD 3.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2
+ RedHat Linux Advanced Work Station 2.1
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Office Server
+ S.u.S.E. SuSE eMail Server III
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
+ SuSE SUSE Linux Enterprise Server 7
OpenSSL Project OpenSSL 0.9.6 a
+ Conectiva Linux 7.0
+ NetBSD NetBSD 1.5.3
+ NetBSD NetBSD 1.5.2
+ NetBSD NetBSD 1.5.1
+ NetBSD NetBSD 1.5
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
+ S.u.S.E. Linux 7.1
OpenSSL Project OpenSSL 0.9.6
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Conectiva Linux 6.0
+ EnGarde Secure Linux 1.0.1
+ HP Secure OS software for Linux 1.0
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ NetBSD NetBSD 1.6 beta
+ NetBSD NetBSD 1.6
+ NetBSD NetBSD 1.5.3
+ NetBSD NetBSD 1.5.2
+ NetBSD NetBSD 1.5.1
+ NetBSD NetBSD 1.5
+ OpenBSD OpenBSD 2.9
+ OpenPKG OpenPKG 1.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
+ Trustix Secure Linux 1.1
OpenSSL Project OpenSSL 0.9.5 a
+ Debian Linux 3.0
+ HP Secure OS software for Linux 1.0
+ Immunix Immunix OS 7.0
+ Immunix Immunix OS 6.2
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ OpenBSD OpenBSD 2.8
+ OpenBSD OpenBSD 2.7
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ S.u.S.E. Linux 7.0 sparc
+ S.u.S.E. Linux 7.0 ppc
+ S.u.S.E. Linux 7.0 i386
+ S.u.S.E. Linux 7.0 alpha
OpenSSL Project OpenSSL 0.9.5
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
OpenSSL Project OpenSSL 0.9.4
+ Debian Linux 3.0
+ OpenBSD OpenBSD 2.6
OpenSSL Project OpenSSL 0.9.3
OpenSSL Project OpenSSL 0.9.2 b
OpenSSL Project OpenSSL 0.9.1 c
IBM HTTP Server 1.3.28
IBM HTTP Server 1.3.26 .2
IBM HTTP Server 1.3.26 .1
IBM HTTP Server 1.3.26
IBM HTTP Server 1.3.19 .5
IBM HTTP Server 1.3.19 .4
IBM HTTP Server 1.3.19 .3
IBM HTTP Server 1.3.19 .2
IBM HTTP Server 1.3.19 .1
IBM HTTP Server 1.3.19
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- RedHat Linux 7.1
- S.u.S.E. Linux 7.1
- Sun Solaris 7.0
- Sun Solaris 2.6
IBM HTTP Server 1.3.12 .7
IBM HTTP Server 1.3.12 .6
IBM HTTP Server 1.3.12 .5
IBM HTTP Server 1.3.12 .4
- IBM AIX 4.3.3
- IBM AIX 5.1
- RedHat Linux 7.1
- S.u.S.E. Linux 7.2
IBM HTTP Server 1.3.12 .3
- HP HP-UX 11.0
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
- Sun Solaris 2.6
IBM HTTP Server 1.3.12 .2
- Caldera OpenLinux 2.4
- Caldera OpenLinux 2.3
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows NT 4.0
- RedHat Linux 6.2 sparc
- Sun Solaris 2.6
- Turbolinux Turbolinux 6.0
IBM HTTP Server 1.3.12 .1
IBM HTTP Server 1.3.12
OpenSSL Project OpenSSL 0.9.7 c
+ OpenPKG OpenPKG 2.0
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux -current
OpenSSL Project OpenSSL 0.9.7 beta3
OpenSSL Project OpenSSL 0.9.7 beta2
OpenSSL Project OpenSSL 0.9.7 beta1
OpenSSL Project OpenSSL 0.9.7 b
+ OpenPKG OpenPKG 1.3
OpenSSL Project OpenSSL 0.9.7 a
+ Conectiva Linux 9.0
+ OpenPKG OpenPKG Current
OpenSSL Project OpenSSL 0.9.7
+ Caldera OpenUnix 8.0
+ Caldera UnixWare 7.1.3
+ Caldera UnixWare 7.1.1
+ FreeBSD FreeBSD 5.0
+ OpenBSD OpenBSD 3.2
+ OpenPKG OpenPKG 1.2
OpenSSL Project OpenSSL 0.9.6 k
+ Blue Coat Systems CacheOS CA/SA 4.1.10
+ Blue Coat Systems Security Gateway OS 3.1
+ Blue Coat Systems Security Gateway OS 3.0
+ Blue Coat Systems Security Gateway OS 2.1.5001 SP1
+ Blue Coat Systems Security Gateway OS 2.1.9
+ Blue Coat Systems Security Gateway OS 2.0
+ Slackware Linux 8.1
OpenSSL Project OpenSSL 0.9.6 j
OpenSSL Project OpenSSL 0.9.6 i
+ HP Apache-Based Web Server 1.3.27 .01
+ HP Apache-Based Web Server 1.3.27 .00
+ HP HP-UX Apache-Based Web Server 1.0.1 .01
+ HP HP-UX Apache-Based Web Server 1.0 .07.01
+ HP HP-UX Apache-Based Web Server 1.0 .06.02
+ HP HP-UX Apache-Based Web Server 1.0 .06.01
+ HP HP-UX Apache-Based Web Server 1.0 .05.01
+ HP HP-UX Apache-Based Web Server 1.0 .04.01
+ HP HP-UX Apache-Based Web Server 1.0 .03.01
+ HP HP-UX Apache-Based Web Server 1.0 .02.01
+ HP HP-UX Apache-Based Web Server 1.0 .01
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux Personal 8.2
OpenSSL Project OpenSSL 0.9.6 h
OpenSSL Project OpenSSL 0.9.6 g
+ Conectiva Linux Enterprise Edition 1.0
+ FreeBSD FreeBSD 4.7 -RELEASE
+ FreeBSD FreeBSD 4.7
+ HP Apache-Based Web Server 2.0.43 .04
+ HP Apache-Based Web Server 2.0.43 .00
+ HP Webmin-Based Admin 1.0 .01
+ Immunix Immunix OS 7+
+ NetBSD NetBSD 1.6
+ OpenPKG OpenPKG 1.1
OpenSSL Project OpenSSL 0.9.6 f

- 不受影响的程序版本

OpenSSL Project OpenSSL 0.9.7 c
+ OpenPKG OpenPKG 2.0
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux -current
OpenSSL Project OpenSSL 0.9.7 beta3
OpenSSL Project OpenSSL 0.9.7 beta2
OpenSSL Project OpenSSL 0.9.7 beta1
OpenSSL Project OpenSSL 0.9.7 b
+ OpenPKG OpenPKG 1.3
OpenSSL Project OpenSSL 0.9.7 a
+ Conectiva Linux 9.0
+ OpenPKG OpenPKG Current
OpenSSL Project OpenSSL 0.9.7
+ Caldera OpenUnix 8.0
+ Caldera UnixWare 7.1.3
+ Caldera UnixWare 7.1.1
+ FreeBSD FreeBSD 5.0
+ OpenBSD OpenBSD 3.2
+ OpenPKG OpenPKG 1.2
OpenSSL Project OpenSSL 0.9.6 k
+ Blue Coat Systems CacheOS CA/SA 4.1.10
+ Blue Coat Systems Security Gateway OS 3.1
+ Blue Coat Systems Security Gateway OS 3.0
+ Blue Coat Systems Security Gateway OS 2.1.5001 SP1
+ Blue Coat Systems Security Gateway OS 2.1.9
+ Blue Coat Systems Security Gateway OS 2.0
+ Slackware Linux 8.1
OpenSSL Project OpenSSL 0.9.6 j
OpenSSL Project OpenSSL 0.9.6 i
+ HP Apache-Based Web Server 1.3.27 .01
+ HP Apache-Based Web Server 1.3.27 .00
+ HP HP-UX Apache-Based Web Server 1.0.1 .01
+ HP HP-UX Apache-Based Web Server 1.0 .07.01
+ HP HP-UX Apache-Based Web Server 1.0 .06.02
+ HP HP-UX Apache-Based Web Server 1.0 .06.01
+ HP HP-UX Apache-Based Web Server 1.0 .05.01
+ HP HP-UX Apache-Based Web Server 1.0 .04.01
+ HP HP-UX Apache-Based Web Server 1.0 .03.01
+ HP HP-UX Apache-Based Web Server 1.0 .02.01
+ HP HP-UX Apache-Based Web Server 1.0 .01
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux Personal 8.2
OpenSSL Project OpenSSL 0.9.6 h
OpenSSL Project OpenSSL 0.9.6 g
+ Conectiva Linux Enterprise Edition 1.0
+ FreeBSD FreeBSD 4.7 -RELEASE
+ FreeBSD FreeBSD 4.7
+ HP Apache-Based Web Server 2.0.43 .04
+ HP Apache-Based Web Server 2.0.43 .00
+ HP Webmin-Based Admin 1.0 .01
+ Immunix Immunix OS 7+
+ NetBSD NetBSD 1.6
+ OpenPKG OpenPKG 1.1
OpenSSL Project OpenSSL 0.9.6 f

- 漏洞讨论

OpenSSL SSLv2 has been reported prone to a remotely triggered denial of service when processing a specially crafted malicious CLIENT_MASTER_KEY message.

It has been reported that a remote attacker may use a maliciously crafted CLIENT_MASTER_KEY message to influence the execution flow of a vulnerable service implmenting SSLv2 into a die() procedure. This will effectively cause the affected process to abort, denying service to legitimate users.

This vulnerability is not reported to be present in OpenSSL versions greater than 0.9.6f of the 0.9.6 series of releases, because the use of the die() procedure is no longer implemented. It is not known whether the 0.9.7 series is also affected.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

OpenSSL have reportedly addressed this issue in versions 0.9.6f and greater.

Red Hat has reportedly addressed this issue in the RHSA-2003:291-11 advisory. See referenced advisory for further information relating to obtaining and applying fixes.

Guardian Digital has released an advisory for EnGarde (ESA-20031003-028) to address this issue. Updates may be applied with the Guardian Digital WebTool. Further details may be found in the attached advisory.

VMware has released fixes to address this issue. Please see the related web reference for more information.

IBM has released fixes to address these issues in IBM HTTP Server.


OpenSSL Project OpenSSL 0.9.6 d

OpenSSL Project OpenSSL 0.9.6 c

OpenSSL Project OpenSSL 0.9.6

OpenSSL Project OpenSSL 0.9.6 b

OpenSSL Project OpenSSL 0.9.6 e

OpenSSL Project OpenSSL 0.9.6 a

IBM HTTP Server 1.3.12 .7

IBM HTTP Server 1.3.12 .2

IBM HTTP Server 1.3.12 .6

IBM HTTP Server 1.3.12 .1

IBM HTTP Server 1.3.12 .3

IBM HTTP Server 1.3.12

IBM HTTP Server 1.3.12 .5

IBM HTTP Server 1.3.12 .4

IBM HTTP Server 1.3.19 .1

IBM HTTP Server 1.3.19 .3

IBM HTTP Server 1.3.19 .4

IBM HTTP Server 1.3.19

IBM HTTP Server 1.3.19 .5

IBM HTTP Server 1.3.19 .2

IBM HTTP Server 1.3.26

IBM HTTP Server 1.3.26 .2

IBM HTTP Server 1.3.26 .1

IBM HTTP Server 1.3.28

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站