Ãë¾àÁ¡ID |
22629 |
À§Çèµµ |
40 |
Æ÷Æ® |
80, ... |
ÇÁ·ÎÅäÄÝ |
TCP |
ºÐ·ù |
WWW |
»ó¼¼¼³¸í |
ÇØ´ç È£½ºÆ®¿¡´Â ¹öÀü 2.4.10 ÀÌÀüÀÇ Apache HTTP ¼¹öÀÇ ¾î¶² ¹öÀüÀÌ °¡µ¿ ÁßÀÎ °ÍÀ¸·Î ³ªÅ¸³´Ù. ÇØ´ç ¹öÀüÀº ´ÙÀ½°ú °°Àº ´ÙÁß Ãë¾àÁ¡ÀÌ Á¸ÀçÇÑ´Ù.
- reverse proxy·Î ¼¼ÆÃµÈ ¼¹öÀÇ 'mod_proxy' ¸ðµâ¿¡ Ãë¾àÁ¡ÀÌ Á¸ÀçÇØ Á¶ÀÛµÈ ¿äûÀ» ¹ÞÀ»¶§ Â÷Àϵå ÇÁ·Î¼¼½º°¡ Á¾·áµÉ ¼ö ÀÖ´Ù. (CVE-2014-0117)
- ¿äû body ¾ÐÃàÇØÁ¦°¡ ¼³Á¤µÇ¾î ÀÖÀ»¶§, 'mod_deflate' ¸ðµâ¿¡ Ãë¾àÁ¡ÀÌ Á¸ÀçÇØ ¼¹öÀÇ ÀÚ¿øÀ» °í°¥ ½Ãų ¼ö ÀÖ´Ù. (CVE-2014-0118)
- °ø°³ÀûÀ¸·Î Á¢±Ù °¡´ÉÇÑ server status ÆäÀÌÁö°¡ »ç¿ëµÉ¶§, 'mod_status' ¸ðµâ¿¡ °áÇÔÀÌ Á¸ÀçÇØ, Á¶ÀÛµÈ ¿äûÀ» º¸³» heap buffer overflow°¡ ¹ß»ýÇÒ ¼ö ÀÖ´Ù.(CVE-2014-0226)
- CGI scriptsÀÇ 'mod_cgid' ¸ðµâ¿¡ Ãë¾àÁ¡ÀÌ Á¸ÀçÇØ ¼ºñ½º °ÅºÎ »óÅ¿¡ ºüÁú ¼ö ÀÖ´Ù. (CVE-2014-0231)
- ±âº» AcceptFilter¸¦ »ç¿ëÇÒ¶§ WinNT MPM versions 2.4.1 ~ 2.4.9¿¡ ¸Þ¸ð¸® ´©¼ö Ãë¾àÁ¡ÀÌ Á¸ÀçÇØ, ¼ºñ½º °ÅºÎ»óÅ¿¡ ºüÁú ¼ö ÀÖ´Ù. (CVE-2014-3523)
* ¾Ë¸²: ÀÌ Á¡°ËÇ׸ñÀº ÀÌ Ãë¾àÁ¡À» Á¡°ËÇϱâ À§ÇØ ÇØ´ç À¥ ¼¹öÀÇ ¹è³Ê Á¤º¸¸¸À» È®ÀÎÇÑ´Ù. µû¶ó¼ °ÅÁþ ¾ç¼º¹ÝÀÀ(False Positive)À» º¸ÀÏ ¼ö ÀÖ´Ù.
* Âü°í »çÀÌÆ®: http://www.apache.org/dist/httpd/CHANGES_2.4.10 http://httpd.apache.org/security/vulnerabilities_24.html
* ¿µÇâÀ» ¹Þ´Â Ç÷§Æû: Apache HTTP Server 2.4.10 ÀÌÀüÀÇ 2.4.x ¹öÀüµé |
ÇØ°áÃ¥ |
Apache Software Foundation À¥ »çÀÌÆ®ÀÎ http://httpd.apache.org/download.cgi ¿¡¼ ±¸ÇÒ ¼ö ÀÖ´Â Apache HTTP ServerÀÇ °¡Àå ÃֽŠ¹öÀü(2.4.10 ȤÀº ÀÌÈÄ)À¸·Î ¾÷±×·¹À̵å ÇÏ¿©¾ß ÇÑ´Ù. |
°ü·Ã URL |
CVE-2014-0117,CVE-2014-0118,CVE-2014-0226,CVE-2014-0231,CVE-2014-3523 (CVE) |
°ü·Ã URL |
68740,68745,68678,68742,68747 (SecurityFocus) |
°ü·Ã URL |
(ISS) |
|