JSEMTS搜尋引擎
 

Subject: [UNIX] Backdoor Password in Red Hat Linux Virtual Server Package Date: Wed, 26 Apr 2000 00:34:02 +0200 Backdoor Password in Red Hat Linux Virtual Server Package -------------------------------------------------------------------------------- SUMMARY Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server. DETAILS Impact: With this backdoor password, an attacker could compromise the web server as well as deface and destroy the web site. Affected Versions: Piranha is distributed in three Red Hat Package Managers (RPMs): "piranha", "piranha-gui", and "piranha-docs". The vulnerability is present if version 0.4.12 of piranha-gui is installed. The current distribution of Red Hat Linux 6.2 distribution is vulnerable. Earlier versions of the Red Hat distribution do not contain this vulnerability. Description: Piranha is a collection of utilities used to administer the Linux Virtual Server. LVS is a scalable and highly available server designed for large enterprise environments. It allows seamless clustering of multiple web servers through load balancing, heartbeat monitoring, redundancy, and fail-over protection. To the end user, the entire system is completely transparent, appearing as if a single server is fielding every request. Piranha is shipped with a web-based GUI that allows system administrators to configure and monitor the cluster. The Piranha package contains an undocumented backdoor account and password that may allow a remote attacker access to the LVS web administration tools. Attackers could use these tools to cause the interface to execute arbitrary commands against the server. Commands are executed with the same privilege level of the web server, which varies based on the configuration of the system. The vulnerability is present even if the LVS service is not used on the system. If the affected "piranha-gui" package is installed and the password has not been changed by the administrator, the system is vulnerable. Recommendations: Red Hat has provided updated piranha, piranha-doc, and piranha-gui packages 0.4.13-1. ISS X-Force recommends that these patches be installed immediately. The updated piranha-gui package addresses the password and arbitrary command execution vulnerability. After upgrading to piranha 0.4.13-1 users should ensure that a password is set by logging into the piranha web gui and setting one. The updated packages are available on ftp://updates.redhat.com/6.2, and their version number is 0.4.13-1. ADDITIONAL INFORMATION The information was provided by: X-Force. ==================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=9156629 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=1341959 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1791178 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=8282063 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=9703504 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=3833279 [前往]Jiebbs[前往][技術] 真正關閉Windows的UAC[教學] Windows Event log 每日備份 Script[前往]parentingliteracy[前往]wdasectokyodisneyresortwandertail[前往]Odysee[前往][前往]twline5tech.udn[前往]hcl-softwarebookmarks[前往]hk.investingbrandinlabs[前往]newspringshop[前往]thaprobaniannostalgiawaca[前往][前往]amlsingscandalopediaelementalcraft[前往][前往][前往]34.100.194.145[前往][前往]jubo-healthacmehldklms.ntouZhinanzhen[前往][前往][前往]e-museptsplus.tvaso[前往][前往][前往]ec.pili[前往]buybenNinini573rcheersEvents18Xiaoping777[前往]77gahttp://archivestar.rr.nu/?site=1Windsorcn[機密] 2020事故報告SomeeFigmasecret.nchu[分享] 利用機器學習檢測網絡釣魚攻擊chowsangsangFun1sapolivebeddinglandtop[前往][前往][資訊] AESXKEY申請lineNxtcbeo-chiontecomMamaclubWeeblydbmyxxwjingjincloud[前往][分享] 網友分享作品hk01troonindex[教學] TCP Port 說明FitClubgogorofoodtastic6000ziyuanQupu123[前往]hkejofficial.meetbao[前往]Surface3D[前往]isexsex[前往]Okaywanbytes-the-dust[前往]ricohMyth1lfollowin[前往]playmobilinfo[前往][前往][前往][教學] 三眼表模擬器(計時碼錶模擬器)innovue.ltdaiinvest.sinotrade[前往]myproteinnextapplezgyhsjLspandengblogdomagoKteam[前往][前往]iastate[教學] 從「慈不掌兵,義不掌財」到IT專案管理:領導風格對專案失敗率之探討pxmarttk3c[前往]bbslineaws.amazon8fnu[前往][前往]rticharmingscitech.natEdsanewvoicetubeFsquan8[前往][前往]globetape[分享] 負面諧音姓名大全:避免取名時誤踩雷bnb1883bastillepostshopjklMomo365[前往]5dk5navallihill[教學] 關閉打開IE瀏覽器強制跳轉EDGE瀏覽器17play[前往][前往][前往]uptogoproxene[前往][前往]felo[前往]coolpc[前往]googlemesocosmanimate-onlineshop[前往]isupermanMyself-BBS[前往]C4rcGooldenxxxSex8O4ooo[前往][前往]iohLaosu[教學] SEO歸檔星球fdbbs[分享] 赫爾墨斯之矛艦載武力規格總覽書[教學] 顯示卡高階、中階與低階分級量表(2022)SoeParrotStatic.App[前往][教學] Smart Port Forwardingsimsonq[分享] 深偽技術於虛擬戀人詐騙的應用與道德風險研究[前往]gzpu[前往]Vanpeopleconvergence-eqTumblr[前往][前往]meishijournalGamer[前往]jisho[前往][前往]buybenfinfoSubarist[分享] AMD顯示卡風扇轉速調整topchoicelighting[前往]yesharris[資訊] 解決CHROME無法正常使用銀行服務歸檔星球GitHubhttps://mjuamjua.synology.me/[前往][前往][前往]sap[前往]bloggadores[前往][前往]sanmin[前往][前往]ZohopublicdaydreamerhousethornwikiGrok[前往][前往]Muraltechniceoffsetstudio[教學] 萬用和弦(鋼琴)[前往]tyciismksh.phcSienta-clubCgezs[機密] 機密檔案88(紅)oolabtwhilai-foodsthsrceasymaincava4001961200[前往][前往][教學] DNS-over-HTTPS (DoH)libertymallEric1819life.chubb[前往][前往][前往][教學] 自動儲存機制對創意軟體使用穩定性的影響:以 Adobe Illustrator CC 2018 為例nealsyardremediespoyabuy[前往][前往]Jinrihuodongbeijing.govyuanshuohuawin[前往]lineage182[前往]Tucaptionscybernet-apintelhiwelinkanime1GulavawofiiiGm6699[機密] 2023台灣北部女士官私密照Instagramazerothsentinelshttp://kserver3.asuscomm.com/louisvilleareacanoeandkayak[技術] Sambar綜合伺服器介紹mosusjBrockcawp.kmuwuangus[教學] 台灣疑似已被駭客入侵的網站列表(domain2multi-tw)Mir2http://archivestar2.byethost11.com/[前往]Sunlightbulb[前往]finet[前往]xboxWaterloochineseinfo.talkSeasgodIT TOP Blog