CVE-2005-1260
CVSS5.0
发布时间 :2005-05-19 00:00:00
修订时间 :2011-03-07 21:21:32
NMCOS    

[原文]bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb").


[CNNVD]bzip2远程拒绝服务漏洞(CNNVD-200505-1122)

        bzip2允许远程攻击者通过一个可造成无限循环的特制bzip2文件发起拒绝服务攻击(硬盘损耗),(又称为"解压炸弹")。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:ubuntu:ubuntu_linux:5.04
cpe:/a:bzip:bzip2
cpe:/o:ubuntu:ubuntu_linux:4.10

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:749bzip2 Decompression Bomb
oval:org.mitre.oval:def:10700bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1260
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-1122
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA07-319A.html
(UNKNOWN)  CERT  TA07-319A
http://www.vupen.com/english/advisories/2007/3868
(UNKNOWN)  VUPEN  ADV-2007-3868
http://www.vupen.com/english/advisories/2007/3525
(UNKNOWN)  VUPEN  ADV-2007-3525
http://www.ubuntulinux.org/support/documentation/usn/usn-127-1
(UNKNOWN)  UBUNTU  USN-127-1
http://www.securityfocus.com/bid/26444
(UNKNOWN)  BID  26444
http://www.securityfocus.com/bid/13657
(UNKNOWN)  BID  13657
http://www.redhat.com/support/errata/RHSA-2005-474.html
(UNKNOWN)  REDHAT  RHSA-2005:474
http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
(UNKNOWN)  FEDORA  FLSA:158801
http://www.debian.org/security/2005/dsa-741
(UNKNOWN)  DEBIAN  DSA-741
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
(UNKNOWN)  SUNALERT  200191
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
(UNKNOWN)  SUNALERT  103118
http://secunia.com/advisories/27643
(UNKNOWN)  SECUNIA  27643
http://secunia.com/advisories/27274
(UNKNOWN)  SECUNIA  27274
http://secunia.com/advisories/19183
(UNKNOWN)  SECUNIA  19183
http://secunia.com/advisories/15447
(UNKNOWN)  SECUNIA  15447
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
(UNKNOWN)  APPLE  APPLE-SA-2007-11-14
http://docs.info.apple.com/article.html?artnum=307041
(UNKNOWN)  CONFIRM  http://docs.info.apple.com/article.html?artnum=307041
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
(UNKNOWN)  SGI  20060301-01-U

- 漏洞信息

bzip2远程拒绝服务漏洞
中危 其他
2005-05-19 00:00:00 2005-10-20 00:00:00
远程  
        bzip2允许远程攻击者通过一个可造成无限循环的特制bzip2文件发起拒绝服务攻击(硬盘损耗),(又称为"解压炸弹")。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Sun Solaris 10.0
        Sun Solaris 10 SPARC platform patch 126868-01
        http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21 -126868-01-1
        Turbolinux Appliance Server 1.0 Workgroup Edition
        Turbolinux bzip2-1.0.2-8.i586.rpm
        Turbolinux Appliance Server 1.0 Workgroup Edition
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/
        Turbolinux bzip2-devel-1.0.2-8.i586.rpm
        Turbolinux Appliance Server 1.0 Workgroup Edition
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/
        IPCop IPCop 1.4.1
        IPCop IPCop 1.4.8
        http://sourceforge.net/project/showfiles.php?group_id=40604&package_id =35093&release_id=351848
        MandrakeSoft Linux Mandrake 10.0 AMD64
        Mandriva bzip2-1.0.2-17.1.100mdk.amd64.rpm
        Mandrakelinux 10.0/AMD64:
        http://www.mandriva.com/en/download
        Mandriva bzip2-1.0.2-17.1.100mdk.src.rpm
        Mandrakelinux 10.0/AMD64:
        http://www.mandriva.com/en/download
        Mandriva lib64bzip2_1-1.0.2-17.1.100mdk.amd64.rpm
        Mandrakelinux 10.0/AMD64:
        http://www.mandriva.com/en/download
        Mandriva lib64bzip2_1-devel-1.0.2-17.1.100mdk.amd64.rpm
        Mandrakelinux 10.0/AMD64:
        http://www.mandriva.com/en/download
        Turbolinux Turbolinux Server 10.0
        Turbolinux bzip2-1.0.2-8.i586.rpm
        Turbolinux 10 Server
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/up dates/RPMS/bzip2-1.0.2-8.i586.rpm
        Turbolinux bzip2-devel-1.0.2-8.i586.rpm
        Turbolinux 10 Server
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/up dates/RPMS/bzip2-devel-1.0.2-8.i586.rpm
        Turbolinux Turbolinux Desktop 10.0
        Turbolinux bzip2-1.0.2-8.i586.rpm
        Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/u pdates/RPMS/bzip2-1.0.2-8.i586.rpm
        Turbolinux bzip2-devel-1.0.2-8.i586.rpm
        Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/u pdates/RPMS/bzip2-devel-1.0.2-8.i586.rpm
        MandrakeSoft Linux Mandrake 10.1 x86_64
        Mandriva bzip2-1.0.2-20.1.101mdk.src.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva bzip2-1.0.2-20.1.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64bzip2_1-1.0.2-20.1.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64bzip2_1-devel-1.0.2-20.1.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Apple Mac OS X 10.4.10
        Apple Mac OS X 10.4.11 Combo Update (Intel)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16036&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11Intel.dmg
        Apple Mac OS X 10.4.11 Combo Update (PPC)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16051&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11PPC.dmg
        Apple Mac OS X 10.4.2
        Apple Mac OS X 10.4.11 Combo Update (Intel)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16036&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11Intel.dmg
        Apple Mac OS X 10.4.11 Combo Update (PPC)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16051&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11PPC.dmg
        Apple Mac OS X 10.4.3
        Apple Mac OS X 10.4.11 Combo Update (Intel)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16036&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11Intel.dmg
        Apple Mac OS X 10.4.11 Combo Update (PPC)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16051&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11PPC.dmg
        Apple Mac OS X 10.4.4
        Apple Mac OS X 10.4.11 Combo Update (Intel)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16036&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11Intel.dmg
        Apple Mac OS X 10.4.11 Combo Update (PPC)
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=16051&cat= 1&platform=osx&method=sa/MacOSXUpdCombo10.4.11PPC.dmg
        MandrakeSoft Corporate Server 3.0
        Mandriva bzip2-1.0.2-17.1.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva bzip2-1.0.2-17.1.C30mdk.src.rpm
        Corporate 3.0:

- 漏洞信息

16767
bzip2 Malformed Archive Decompression DoS
Context Dependent Denial of Service
Loss of Availability Upgrade
Exploit Public Vendor Verified

- 漏洞描述

bzip2 contains a flaw that may allow a remote denial of service. The issue is triggered due to the handling of malformed bzip2 archives. It is possible for a remote attacker to send a malformed archive, which will cause the application to go into an infinite loop and consume a large amount of disk space and CPU resources, resulting in a loss of availability.

- 时间线

2005-05-20 2005-05-04
2005-05-20 2005-02-15

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 1.0.3, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

bzip2 Remote Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 13657
Yes No
2005-05-17 12:00:00 2008-06-30 11:51:00
The discoverer of this issue is currently unknown.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Home
Turbolinux Appliance Server 1.0 Workgroup Edition
Turbolinux Appliance Server 1.0 Hosting Edition
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 7
Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 10.0_x86
Sun Solaris 10.0
SGI ProPack 3.0 SP6
SGI ProPack 3.0 SP5
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SuSE eMail Server III
S.u.S.E. SuSE eMail Server 3.1
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 7.3
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux IMAP Server 1.0
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
S.u.S.E. Linux 7.3 sparc
S.u.S.E. Linux 7.3 ppc
S.u.S.E. Linux 7.3 i386
S.u.S.E. Linux 7.3
S.u.S.E. Linux 7.2 i386
S.u.S.E. Linux 7.2
S.u.S.E. Linux 7.1 x86
S.u.S.E. Linux 7.1 sparc
S.u.S.E. Linux 7.1 ppc
S.u.S.E. Linux 7.1 alpha
S.u.S.E. Linux 7.1
S.u.S.E. Linux 7.0 sparc
S.u.S.E. Linux 7.0 ppc
S.u.S.E. Linux 7.0 i386
S.u.S.E. Linux 7.0 alpha
S.u.S.E. Linux 7.0
S.u.S.E. Linux 6.4 ppc
S.u.S.E. Linux 6.4 i386
S.u.S.E. Linux 6.4 alpha
S.u.S.E. Linux 6.4
S.u.S.E. Linux 6.3 ppc
S.u.S.E. Linux 6.3 alpha
S.u.S.E. Linux 6.3
S.u.S.E. Linux 6.2
S.u.S.E. Linux 6.1 alpha
S.u.S.E. Linux 6.1
S.u.S.E. Linux 6.0
S.u.S.E. Linux 5.3
S.u.S.E. Linux 5.2
S.u.S.E. Linux 5.1
S.u.S.E. Linux 5.0
S.u.S.E. Linux 4.4.1
S.u.S.E. Linux 4.4
S.u.S.E. Linux 4.3
S.u.S.E. Linux 4.2
S.u.S.E. Linux 4.0
S.u.S.E. Linux 3.0
S.u.S.E. Linux 2.0
S.u.S.E. Linux 1.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
OpenPKG OpenPKG 2.3
OpenPKG OpenPKG 2.2
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1
IPCop IPCop 1.4.6
IPCop IPCop 1.4.5
IPCop IPCop 1.4.4
IPCop IPCop 1.4.2
IPCop IPCop 1.4.1
FreeBSD FreeBSD 5.4 -RELENG
FreeBSD FreeBSD 5.4 -RELEASE
FreeBSD FreeBSD 5.4 -PRERELEASE
FreeBSD FreeBSD 5.3 -STABLE
FreeBSD FreeBSD 5.3 -RELENG
FreeBSD FreeBSD 5.3 -RELEASE
FreeBSD FreeBSD 5.3
FreeBSD FreeBSD 5.2.1 -RELEASE
FreeBSD FreeBSD 5.2 -RELENG
FreeBSD FreeBSD 5.2 -RELEASE
FreeBSD FreeBSD 5.2
FreeBSD FreeBSD 5.1 -RELENG
FreeBSD FreeBSD 5.1 -RELEASE/Alpha
FreeBSD FreeBSD 5.1 -RELEASE-p5
FreeBSD FreeBSD 5.1 -RELEASE
FreeBSD FreeBSD 5.1
FreeBSD FreeBSD 5.0 -RELENG
FreeBSD FreeBSD 5.0 -RELEASE-p14
FreeBSD FreeBSD 5.0 alpha
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 4.11 -STABLE
FreeBSD FreeBSD 4.11 -RELENG
FreeBSD FreeBSD 4.11 -RELEASE-p3
FreeBSD FreeBSD 4.10 -RELENG
FreeBSD FreeBSD 4.10 -RELEASE-p8
FreeBSD FreeBSD 4.10 -RELEASE
FreeBSD FreeBSD 4.10
FreeBSD FreeBSD 4.9 -RELENG
FreeBSD FreeBSD 4.9 -PRERELEASE
FreeBSD FreeBSD 4.9
FreeBSD FreeBSD 4.8 -RELENG
FreeBSD FreeBSD 4.8 -RELEASE-p7
FreeBSD FreeBSD 4.8 -PRERELEASE
FreeBSD FreeBSD 4.8
FreeBSD FreeBSD 4.7 -STABLE
FreeBSD FreeBSD 4.7 -RELENG
FreeBSD FreeBSD 4.7 -RELEASE-p17
FreeBSD FreeBSD 4.7 -RELEASE
FreeBSD FreeBSD 4.7
FreeBSD FreeBSD 4.6.2
FreeBSD FreeBSD 4.6 -STABLE
FreeBSD FreeBSD 4.6 -RELENG
FreeBSD FreeBSD 4.6 -RELEASE-p20
FreeBSD FreeBSD 4.6 -RELEASE
FreeBSD FreeBSD 4.6
FreeBSD FreeBSD 4.5 -STABLEpre2002-03-07
FreeBSD FreeBSD 4.5 -STABLE
FreeBSD FreeBSD 4.5 -RELENG
FreeBSD FreeBSD 4.5 -RELEASE-p32
FreeBSD FreeBSD 4.5 -RELEASE
FreeBSD FreeBSD 4.5
FreeBSD FreeBSD 4.4 -STABLE
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELEASE-p42
FreeBSD FreeBSD 4.4
FreeBSD FreeBSD 4.3 -STABLE
FreeBSD FreeBSD 4.3 -RELENG
FreeBSD FreeBSD 4.3 -RELEASE-p38
FreeBSD FreeBSD 4.3 -RELEASE
FreeBSD FreeBSD 4.3
FreeBSD FreeBSD 4.2 -STABLEpre122300
FreeBSD FreeBSD 4.2 -STABLEpre050201
FreeBSD FreeBSD 4.2 -STABLE
FreeBSD FreeBSD 4.2 -RELEASE
FreeBSD FreeBSD 4.2
FreeBSD FreeBSD 4.1.1 -STABLE
FreeBSD FreeBSD 4.1.1 -RELEASE
FreeBSD FreeBSD 4.1.1
FreeBSD FreeBSD 4.1
FreeBSD FreeBSD 4.0 .x
FreeBSD FreeBSD 4.0 -RELENG
FreeBSD FreeBSD 4.0 alpha
FreeBSD FreeBSD 4.0
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
bzip2 bzip2 1.0.2
Apple Mac OS X Server 10.4.10
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.4.8
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X 10.4.10
Apple Mac OS X 10.4.9
Apple Mac OS X 10.4.8
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X Server 10.4.11
Apple Mac OS X 10.4.11

- 不受影响的程序版本

Apple Mac OS X Server 10.4.11
Apple Mac OS X 10.4.11

- 漏洞讨论

The 'bzip2' utility is prone to a remote denial-of-service vulnerability that arises when the application processes malformed archives.

A successful attack can exhaust system resources and trigger a denial-of-service condition.

This issue affects bzip2 1.0.2; other versions are likely vulnerable as well.

- 漏洞利用

Currently we are not aware of any exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Please see the referenced vendor advisories for details on obtaining and applying fixes.


Sun Solaris 10.0

Turbolinux Appliance Server 1.0 Workgroup Edition

IPCop IPCop 1.4.1

Mandriva Linux Mandrake 10.0 AMD64

Turbolinux Turbolinux Server 10.0

Turbolinux Turbolinux Desktop 10.0

Mandriva Linux Mandrake 10.1 x86_64

Apple Mac OS X 10.4.10

Apple Mac OS X 10.4.2

Apple Mac OS X 10.4.3

Apple Mac OS X 10.4.4

MandrakeSoft Corporate Server 3.0

FreeBSD FreeBSD 4.11 -RELEASE-p3

FreeBSD FreeBSD 5.3

FreeBSD FreeBSD 5.4 -RELENG

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站