JSEMTS搜尋引擎
 

Subject: [UNIX] Backdoor Password in Red Hat Linux Virtual Server Package Date: Wed, 26 Apr 2000 00:34:02 +0200 Backdoor Password in Red Hat Linux Virtual Server Package -------------------------------------------------------------------------------- SUMMARY Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server. DETAILS Impact: With this backdoor password, an attacker could compromise the web server as well as deface and destroy the web site. Affected Versions: Piranha is distributed in three Red Hat Package Managers (RPMs): "piranha", "piranha-gui", and "piranha-docs". The vulnerability is present if version 0.4.12 of piranha-gui is installed. The current distribution of Red Hat Linux 6.2 distribution is vulnerable. Earlier versions of the Red Hat distribution do not contain this vulnerability. Description: Piranha is a collection of utilities used to administer the Linux Virtual Server. LVS is a scalable and highly available server designed for large enterprise environments. It allows seamless clustering of multiple web servers through load balancing, heartbeat monitoring, redundancy, and fail-over protection. To the end user, the entire system is completely transparent, appearing as if a single server is fielding every request. Piranha is shipped with a web-based GUI that allows system administrators to configure and monitor the cluster. The Piranha package contains an undocumented backdoor account and password that may allow a remote attacker access to the LVS web administration tools. Attackers could use these tools to cause the interface to execute arbitrary commands against the server. Commands are executed with the same privilege level of the web server, which varies based on the configuration of the system. The vulnerability is present even if the LVS service is not used on the system. If the affected "piranha-gui" package is installed and the password has not been changed by the administrator, the system is vulnerable. Recommendations: Red Hat has provided updated piranha, piranha-doc, and piranha-gui packages 0.4.13-1. ISS X-Force recommends that these patches be installed immediately. The updated piranha-gui package addresses the password and arbitrary command execution vulnerability. After upgrading to piranha 0.4.13-1 users should ensure that a password is set by logging into the piranha web gui and setting one. The updated packages are available on ftp://updates.redhat.com/6.2, and their version number is 0.4.13-1. ADDITIONAL INFORMATION The information was provided by: X-Force. ==================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=2438964 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=6047905 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1254068 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=3613009 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=2013617 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=3122558 [教學] 以色列屠殺加薩走廊真相famishop.famiqek888[前往]Xxh5gamebbs[前往]claude.ai[前往][前往][分享] 使用Ping來確認網路速度OnlineHostnewspringshopesg.tsmc[前往][教學] 移除WPS OFFICE教學[教學] Chat GPT 的 Chrome 瀏覽器外掛[前往][前往]pttwebmyvideo.net[前往]uco-tku.primo.exlibrisgroup[前往]歸檔星球angleMedium[前往][前往][前往]歸檔星球ecicJorsindoCari[前往]http://hawlhu3.clouds.tw/adimargaretdjwx[前往]Zhiyouchengsearchopentext8fx[前往][前往][前往]proton.mecasio[前往]specialthankTaaisclubOneDriveSwayTaishaweb999ivyStoryonline[前往][前往]wikimediafoundation[前往]aspine[前往]amy6622generalsilicones歸檔星球taitronicslamsnbbsls5156sharecoop.fcuwwunionOdyseetk3c[資訊] 台灣2024選舉作票疑雲Pchomegloria-eyewear[機密] 100%成功減肥方法[分享] 台灣百家姓toyotaSteamipcfptsplus.tvTianranjudailyviewWebNodeOzportal[前往]Yxhsmsvencremer[前往][前往]LohucpokWin1tw985[教學] 批次文件嵌入和執行VBScriptNzdaotingchouseo.whoops[教學] 安裝VB6在Windows10系統Pptlazy-hour[前往]Twitterpixtastockformosasoft[前往][前往]starrocket歸檔星球[前往]肯特城天堂[前往][分享] DOS指令集介紹Hopto[分享] 一些使用AI產生的美女照片Seasgod70thvictory[前往][技術] 真正關閉Windows的UAC[前往]Tucaptions[前往]cdfholding[前往]75onexuyi365bankchbunewsNote[前往]clearnotebooks[教學] 副檔名M3U8影片下載教學[前往]Zhuoyue[前往][前往]iaEvents18ricohhttp://jplop2.float-zone.com/cmn-hant.overseas.ncnuChaforumkobo[前往]Igcpsching-winpadlet.help[前往][前往]vipputer-tw[前往][前往]Hinetyourseousjmercedes-benzmegabank[教學] 系統還原出現錯誤0X81000203解決Risu[前往]Groups Googletdri[前往]dict.revised.moeaiguaji[前往]tamsui.dils.tku[前往][教學] 執行檔簽名方式afnor[前往]kreosite[前往][前往][前往]Yichang[前往]navallihill[教學] IOT學習筆記 ─ 使用Arduino ESP323cxiang142gamehills-selectTenda-teamwordpress[前往]hiwelink[分享] PUA五步陷阱line[前往]thinkwithgoogle[前往]oolabtwwiki.csie.ncku[前往]Momo365glints[前往]nextappleFC2[資訊] 常見副檔名說明onzeblog[前往][前往][前往]Fotor[前往]xunmiyinshi4001961200[前往][資料] 各品牌主機板開機選單快捷鍵(BootMenu Key)mijnwoordenboek.nl[前往]cool3cLUrl[教學] PUBG 閃退(絕地求生)解決方案[前往]Buffer[前往][前往][前往]Cgezsapplealmond[前往]http://www.jfa.com.tw/neocities/hk01longbonTaiwanSwine[前往]iwatex[前往][前往]BlueCGXingfudgy[前往]LineaGem[前往][技術] 7z 常用壓縮/解壓縮指令S-Stargoyoutati[教學] 幽遊白書魔強統一戰-遊戲中唯一具跨軌影響力之特殊招式研究[前往]xyg688msi[前往][前往]https://mjuamjua.synology.me/tejiegmSdsdsoft[前往]SSurwiki.esut.tpVocus[前往][前往]Zzbj[前往]HiendyKatfiletaiwanmobileYanyikuwwwcreativekocpc99kubo[前往]brandinlabs[前往][前往]hotelcozziwehouse-media[前往][前往]Playno1Ljl32prior[前往]Google Sites[前往]bookletHinet[前往][教學] 顯示卡高階、中階與低階分級量表(2022)Co6[前往][前往]ebei[分享] 工研院的老闆許友耕在65歲生日感言[前往][前往][前往]sanlienproface[前往]netbridgetechsanmin[前往]gzpuyongrenqianyounewbalance308308[前往]IT TOP Blog