JSEMTS搜尋引擎
 

Subject: [UNIX] Backdoor Password in Red Hat Linux Virtual Server Package Date: Wed, 26 Apr 2000 00:34:02 +0200 Backdoor Password in Red Hat Linux Virtual Server Package -------------------------------------------------------------------------------- SUMMARY Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server. DETAILS Impact: With this backdoor password, an attacker could compromise the web server as well as deface and destroy the web site. Affected Versions: Piranha is distributed in three Red Hat Package Managers (RPMs): "piranha", "piranha-gui", and "piranha-docs". The vulnerability is present if version 0.4.12 of piranha-gui is installed. The current distribution of Red Hat Linux 6.2 distribution is vulnerable. Earlier versions of the Red Hat distribution do not contain this vulnerability. Description: Piranha is a collection of utilities used to administer the Linux Virtual Server. LVS is a scalable and highly available server designed for large enterprise environments. It allows seamless clustering of multiple web servers through load balancing, heartbeat monitoring, redundancy, and fail-over protection. To the end user, the entire system is completely transparent, appearing as if a single server is fielding every request. Piranha is shipped with a web-based GUI that allows system administrators to configure and monitor the cluster. The Piranha package contains an undocumented backdoor account and password that may allow a remote attacker access to the LVS web administration tools. Attackers could use these tools to cause the interface to execute arbitrary commands against the server. Commands are executed with the same privilege level of the web server, which varies based on the configuration of the system. The vulnerability is present even if the LVS service is not used on the system. If the affected "piranha-gui" package is installed and the password has not been changed by the administrator, the system is vulnerable. Recommendations: Red Hat has provided updated piranha, piranha-doc, and piranha-gui packages 0.4.13-1. ISS X-Force recommends that these patches be installed immediately. The updated piranha-gui package addresses the password and arbitrary command execution vulnerability. After upgrading to piranha 0.4.13-1 users should ensure that a password is set by logging into the piranha web gui and setting one. The updated packages are available on ftp://updates.redhat.com/6.2, and their version number is 0.4.13-1. ADDITIONAL INFORMATION The information was provided by: X-Force. ==================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=3192816 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=9050021 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=9560004 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=2500542 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=3427191 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1228841 [前往]crusalis[前往]cm-pethttp://archivestar2.byethost11.com/Dnaxcat[分享] Arduino常用函數[前往][前往]haidong365taro1985歸檔星球[機密] 100%成功減肥方法sanminhttp://web3.nutc.edu.tw/~s1711131010/ebooks-cct[前往]shybaoshonm32followinTwstayFirewar888Ncku1897[資訊] 顯示卡天梯2021tempointkobotroonindexhawkgaugeNotionPchome[前往][前往]taiwanpay[前往]Trello[分享] FightCade對戰平台http://9d.jplopsoft.idv.tw/jiufengls[前往][前往][前往]daybuy[教學] IOT學習筆記 ─ 使用Arduino ESP32[教學] 禁用密碼清單bloggadores[前往]Ppt[教學] SEOJorsindoxiaoditechbeijing.govGoogleEditdata.tainankreositeChinesecj[前往][前往]155384Meworks[技術] Sambar綜合伺服器介紹aiguajiboseeasycard[前往]SdsdsoftEast6EduBlogsgoyoutatigeocitiescharmingscitech.natshopping.fridaysmctw[分享] AMD顯示卡風扇轉速調整Pokuyoestate-blog[前往][前往]gsmall[前往]yslbeauty[前往]cybernet-ap[前往][前往][前往]HD.Clublifestyle-global[前往]歸檔星球[前往][分享] 台灣百家姓[前往]daughterSex85nxnIdcpferb[前往][前往]HamiltonchineseJinrihuodongpriorwordpressJinritongbai[前往][教學] Win10的Explorer記憶體VRam洩漏問題uwan[前往]jcdqzdhAudionetZzbj[前往]5156share[前往][分享] 全虛擬化 vs. 半虛擬化(PV vs. FV)[前往]Unitehk52print[前往]WebFloweasypsTilda[前往][前往]BlueCGloccitaneGilineageshopwtberkle64[前往]ratcaurorakongminghuericdatafocus.586TeafishworldjournalrakuyamojoinCaribuzzorangeNewloveryxsensingsym-global[技術] 停用Windows10更新100年的方法howhite[前往][前往][前往]search.yahooinnovue.ltdsapBufferLINE ME9kuan9butygoIdcpfzhonghuayuwen[前往][前往][前往]verse.asiabostonpie[前往]svencremer8fx[前往]twinheadtwitwsopentixlaw.ntpuWMHP[分享] 網友分享作品libertymall[教學] 解決 Windows 安全中心無法打開的問題[前往]sdhuifa[技術] 現代軟體架構的比較與應用:驅動架構的實踐與趨勢[前往]FC2Yanyikucnyes[前往][前往]9438hongtouwenaeroleadxn--kbto70fcna[前往][前往]dict.concised.moenealsyardremediesbusinesstoday[分享] 赫爾墨斯之矛艦載武力規格總覽書frenchviolationivy[前往][前往]歸檔星球Briiancyanideaparentingliteracy[前往]tvbsedominiumsnw999thai-kin[前往]fetnetflyscoot[前往]TaaisclubYxwst58Helloprimitivewikihow[教學] Rufus取代品Ventoy[前往]G-yearsAlpha[前往]web999fortunebreedersunewskingsHiendyhilai-foodsjcapothecaryhttp://jplop-ki9.softether.net/ragiclaihaobrandinlabsusj[前往]ycccofirstnature[前往]buyben[前往]knewsPandaro[教學] 三眼表模擬器(計時碼錶模擬器)[前往]asicsartkaoji[前往]fujitsu[前往]Seo-lv[前往][前往]hamivideo.hinet[前往]scotchftnn[前往]digitimescoolpc[前往]shopjkl[前往][前往][技術] 7z 常用壓縮/解壓縮指令17-richbeautyanime1hermespaulaschoice[前往]kktvweb.piappanglebuyben佳福雅JFA佳福雅JFA[前往]Wudao28[前往][前往]ISnuttynutsshopos[前往]callingtaiwanwuangusikea[前往][前往][前往]foreverreloveplateup-wiki-kouryaku[技術] LibreOffice卡頓問題解決[前往]Utbbsdbblackpork[前往][前往][前往][教學] Windows Event log 每日備份 Script[前往][教學] Windows 10 自動登入feloIT TOP Blog