让您全面了解并上手亿速云产品
常见入门级使用教程
对外 API 开发文档中心
您历史提交的工单
您的每一条意见,我们都严谨处理
您的每一条建议,我们都认真对待
CNNVD-ID编号 | CNNVD-202004-377 | CVE编号 | CVE-2020-11612 |
发布时间 | 2020-04-07 | 更新时间 | 2021-01-20 |
漏洞类型 | 缓冲区错误 | 漏洞来源 | N/A |
危险等级 | 超危 | 威胁类型 | 远程 |
厂商 | N/A |
Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。
Netty 4.1.46之前的4.1.x版本中的ZlibDecoders存在缓冲区错误漏洞,该漏洞源于程序在解码ZlibEncoded字节流时没有限制内存分配。攻击者可通过发送大量ZlibEncoded字节流到Netty服务器利用该漏洞占用资源,导致拒绝服务。
目前厂商已发布升级了Netty 缓冲区错误漏洞的补丁,Netty 缓冲区错误漏洞的补丁获取链接:
https://github.com/netty/netty/pull/9924
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
链接:https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
来源:FEDORA
来源:CONFIRM
来源:MLIST
来源:MLIST
来源:www.auscert.org.au
来源:www.nsfocus.net
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160562/Red-Hat-Security-Advisory-2020-5568-01.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159741/Ubuntu-Security-Notice-USN-4600-2.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158534/Red-Hat-Security-Advisory-2020-3133-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159015/Red-Hat-Security-Advisory-2020-3585-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158128/Red-Hat-Security-Advisory-2020-2605-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157507/Red-Hat-Security-Advisory-2020-1422-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158916/Red-Hat-Security-Advisory-2020-3501-01.html
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.oracle.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158651/Red-Hat-Security-Advisory-2020-3197-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157352/Red-Hat-Security-Advisory-2020-1538-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158220/Red-Hat-Security-Advisory-2020-2751-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159208/Red-Hat-Security-Advisory-2020-3779-01.html
来源:www.auscert.org.au
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159551/Red-Hat-Security-Advisory-2020-4252-01.html
来源:www.auscert.org.au
来源:www.ibm.com
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158150/Red-Hat-Security-Advisory-2020-2618-01.html
来源:www.auscert.org.au
暂无