- 漏洞ID:1200942
- 漏洞类型:设计错误
- 发布日期:2007-03-06
- 更新时间:2007-03-08
- CVE编号: CVE-2004-2680
- CNNVD-ID:CNNVD-200412-1012
- 漏洞平台: N/A
- CVSS评分:5.0
<a href="https://www.securityfocus.com/bid/22849" target="_blank">https://www.securityfocus.com/bid/22849</a><br/> <a href="http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-1012" target="_blank">http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-1012</a><br/>
输出滤波器处理超过16384个字节时,mod_python(libapache2-mod-python)3.1.4及其以前版本不能正确处理,该漏洞可导致filter.read回到先前释放的内存部分。
来源:launchpad.net
链接:https://launchpad.net/bugs/89308
来源:MLIST
名称:[httpd-python-dev]20040416patchforfilterobject.c
链接:http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772@pixar.com%3e
来源:MLIST
名称:[httpd-python-dev]20040416possiblebuginfilter.write()
链接:http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772@pixar.com%3e
来源:MLIST
名称:[httpd-python-dev]20040416Re:possiblebuginfilter.write()
链接:http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772@pixar.com%3e
来源:issues.rpath.com
链接:https://issues.rpath.com/browse/RPL-1105
来源:XF
名称:modpython-outputfilter-info-disclosure(14751)
链接:http://xforce.iss.net/xforce/xfdb/14751
来源:UBUNTU
名称:USN-430-1
链接:http://www.ubuntu.com/usn/usn-430-1
来源:BID
名称:22849
链接:http://www.securityfocus.com/bid/22849
来源:BUGTRAQ
名称:20070307rPSA-2007-0051-1mod_python
链接:http://www.securityfocus.com/archive/1