Debian DLA-2362-1:uwsgi 安全性更新

critical Nessus Plugin ID 140224

概要

遠端 Debian 主機缺少一個安全性更新。

說明

Apache HTTP 伺服器 2.4.32 之前版本使用 src: uwsgi,在其中發現一個瑕疵。uwsgi 通訊協定不允許我們序列化超過 16K 的 HTTP 標頭,這會導致資源耗盡和拒絕服務。

針對 Debian 9「Stretch」,已在 2.0.14+20161117-3+deb9u3 版本中修正此問題。

建議您升級 uwsgi 套件。

如需有關 uwsgi 安全性狀態的詳細資訊,請參閱其安全追蹤頁面: https://security-tracker.debian.org/tracker/uwsgi

注意:Tenable Network Security 已直接從 DLA 安全性公告擷取前置描述區塊。Tenable 已盡量在不造成其他問題的前提下,嘗試自動清理並將其格式化。

解決方案

升級受影響的套件。

另請參閱

https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html

https://packages.debian.org/source/stretch/uwsgi

https://security-tracker.debian.org/tracker/source-package/uwsgi

Plugin 詳細資訊

嚴重性: Critical

ID: 140224

檔案名稱: debian_DLA-2362.nasl

版本: 1.5

類型: local

代理程式: unix

已發布: 2020/9/4

已更新: 2024/2/22

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: High

基本分數: 7.5

時間分數: 5.9

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 評分資料來源: CVE-2020-11984

CVSS v3

風險因素: Critical

基本分數: 9.8

時間分數: 8.8

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:libapache2-mod-proxy-uwsgi, p-cpe:/a:debian:debian_linux:libapache2-mod-proxy-uwsgi-dbg, p-cpe:/a:debian:debian_linux:libapache2-mod-ruwsgi, p-cpe:/a:debian:debian_linux:libapache2-mod-ruwsgi-dbg, p-cpe:/a:debian:debian_linux:libapache2-mod-uwsgi, p-cpe:/a:debian:debian_linux:libapache2-mod-uwsgi-dbg, p-cpe:/a:debian:debian_linux:python-uwsgidecorators, p-cpe:/a:debian:debian_linux:python3-uwsgidecorators, p-cpe:/a:debian:debian_linux:uwsgi, p-cpe:/a:debian:debian_linux:uwsgi-app-integration-plugins, p-cpe:/a:debian:debian_linux:uwsgi-core, p-cpe:/a:debian:debian_linux:uwsgi-dbg, p-cpe:/a:debian:debian_linux:uwsgi-emperor, p-cpe:/a:debian:debian_linux:uwsgi-extra, p-cpe:/a:debian:debian_linux:uwsgi-infrastructure-plugins, p-cpe:/a:debian:debian_linux:uwsgi-mongodb-plugins, p-cpe:/a:debian:debian_linux:uwsgi-plugin-alarm-curl, p-cpe:/a:debian:debian_linux:uwsgi-plugin-alarm-xmpp, p-cpe:/a:debian:debian_linux:uwsgi-plugin-asyncio-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-asyncio-python3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-curl-cron, p-cpe:/a:debian:debian_linux:uwsgi-plugin-emperor-pg, p-cpe:/a:debian:debian_linux:uwsgi-plugin-fiber, p-cpe:/a:debian:debian_linux:uwsgi-plugin-gccgo, p-cpe:/a:debian:debian_linux:uwsgi-plugin-geoip, p-cpe:/a:debian:debian_linux:uwsgi-plugin-gevent-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-glusterfs, p-cpe:/a:debian:debian_linux:uwsgi-plugin-graylog2, p-cpe:/a:debian:debian_linux:uwsgi-plugin-greenlet-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-jvm-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-jwsgi-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-ldap, p-cpe:/a:debian:debian_linux:uwsgi-plugin-lua5.1, p-cpe:/a:debian:debian_linux:uwsgi-plugin-lua5.2, p-cpe:/a:debian:debian_linux:uwsgi-plugin-luajit, p-cpe:/a:debian:debian_linux:uwsgi-plugin-mono, p-cpe:/a:debian:debian_linux:uwsgi-plugin-php, p-cpe:/a:debian:debian_linux:uwsgi-plugin-psgi, p-cpe:/a:debian:debian_linux:uwsgi-plugin-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-python3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-rack-ruby2.3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-rados, p-cpe:/a:debian:debian_linux:uwsgi-plugin-rbthreads, p-cpe:/a:debian:debian_linux:uwsgi-plugin-ring-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-router-access, p-cpe:/a:debian:debian_linux:uwsgi-plugin-servlet-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-sqlite3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-tornado-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-v8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-xslt, p-cpe:/a:debian:debian_linux:uwsgi-plugins-all, p-cpe:/a:debian:debian_linux:uwsgi-src, cpe:/o:debian:debian_linux:9.0

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/9/2

弱點發布日期: 2020/8/7

參考資訊

CVE: CVE-2020-11984