JSEMTS搜尋引擎
 

Subject: [UNIX] Backdoor Password in Red Hat Linux Virtual Server Package Date: Wed, 26 Apr 2000 00:34:02 +0200 Backdoor Password in Red Hat Linux Virtual Server Package -------------------------------------------------------------------------------- SUMMARY Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server. DETAILS Impact: With this backdoor password, an attacker could compromise the web server as well as deface and destroy the web site. Affected Versions: Piranha is distributed in three Red Hat Package Managers (RPMs): "piranha", "piranha-gui", and "piranha-docs". The vulnerability is present if version 0.4.12 of piranha-gui is installed. The current distribution of Red Hat Linux 6.2 distribution is vulnerable. Earlier versions of the Red Hat distribution do not contain this vulnerability. Description: Piranha is a collection of utilities used to administer the Linux Virtual Server. LVS is a scalable and highly available server designed for large enterprise environments. It allows seamless clustering of multiple web servers through load balancing, heartbeat monitoring, redundancy, and fail-over protection. To the end user, the entire system is completely transparent, appearing as if a single server is fielding every request. Piranha is shipped with a web-based GUI that allows system administrators to configure and monitor the cluster. The Piranha package contains an undocumented backdoor account and password that may allow a remote attacker access to the LVS web administration tools. Attackers could use these tools to cause the interface to execute arbitrary commands against the server. Commands are executed with the same privilege level of the web server, which varies based on the configuration of the system. The vulnerability is present even if the LVS service is not used on the system. If the affected "piranha-gui" package is installed and the password has not been changed by the administrator, the system is vulnerable. Recommendations: Red Hat has provided updated piranha, piranha-doc, and piranha-gui packages 0.4.13-1. ISS X-Force recommends that these patches be installed immediately. The updated piranha-gui package addresses the password and arbitrary command execution vulnerability. After upgrading to piranha 0.4.13-1 users should ensure that a password is set by logging into the piranha web gui and setting one. The updated packages are available on ftp://updates.redhat.com/6.2, and their version number is 0.4.13-1. ADDITIONAL INFORMATION The information was provided by: X-Force. ==================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=7322048 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=8231336 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=9904513 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1230468 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=6653645 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=6174045 [分享] 網友分享作品[前往][機密] 會員名單https://jplop.neocities.org/[教學] 縮網址服務Nzdao[前往]8fishhaoyipets[教學] 關閉打開IE瀏覽器強制跳轉EDGE瀏覽器[前往][教學] 免費看影片網站推薦bastillepostJin999DdininderJingdexian[前往]jade-crack[分享] Arduino常用函數[前往]51wanshuanewbalance[前往]leftbank168Fsquan8travel.yam[前往]cyunshopGuanggu[前往][前往]jylawyer[前往][前往][前往]築夢天堂[前往][前往][前往]Groups Google[教學] 三眼表模擬器(計時碼錶模擬器)Guzhen0552[技術] Chrome瀏覽器使用公共解析Public DNSmookbusepsonlaw.ntpuawoo.aiSsjyw旗袍旗袍[教學] 應用程式變服務(RunAsSvc)hbhousingXiuwushidaiseo.whoopsCarrd[教學] 使用Deadwood封鎖指定軟體服務之研究(以Adobe為例)searchJinrihuodongcontrel[科技] HTTPS部分網站無法瀏覽ShortUrltheinitiumJJVK[前往][前往]esliteLvzikushopwtb[前往][前往]aws.amazonRoheya[前往]Wuwuji2ndstreetisupermanKy58UDNpixtastockltnshopFaceBookhttp://wsi4.fortidyndns.com/[前往]bytes-the-dustdocs.dify.aiBassadvkreositeGamehusejandcsdhuifalivenationQoos[前往][前往]social-labMir2tcumaoshan73[前往]vipputer-twtinhdoanbinhphuoc.vnsenheyuanafnoreasymainshophyphytvbs[前往]strongltd[教學] 線上Port掃描工具xuyi365ofiiiKatfileprrpc序號搜尋序號搜尋cjjc.weblio[前往]knewsbaike[前往]sesodaFlashdown365[前往]vip.udn[前往]Boniu123[前往]歸檔星球mclassic[前往]jasperpedia[前往][教學] 禁用密碼清單MyGamesOnline[教學] 以色列屠殺加薩走廊真相film-supplytcbLineaGem[前往][前往]butygo[前往]專情の團員作品精選專情の團員作品精選 xiaoditech[前往]trendmicro123pk5nxn[前往][分享] 錄製網路攝影機畫面、螢幕畫面(PotPlayer)Wechurchsurevisionsu.ntpu[教學] Win7/Win8.1升級Win10[前往]technice[前往]Hkmensahttp://archivestar.rr.nu/?site=1Ruike1[前往][前往][前往]rtigng[前往]futuretech[前往]kongminghuFun1workerman.waca[前往][前往]PhotobuddhaWeeblyshiwikibusinessprofoodtasticnews.yahoo歸檔星球finfoBriianbrands[前往]Gilineageapairplus[前往]searchRobofunTumblr[前往]AsusWebStorage[前往]nssor-estore[前往]jcapothecaryLineag1[前往][前往]texturemakersuperboxMD5 DecodeSanesoft[前往]azerothsentinelsecosiahongkongdisneylandniHinetWin1[前往][前往]alaibankchb[前往]jiyangtt[前往][前往]citytalk[前往][前往][前往]microsoftCoolalerminfish[前往][前往]garmin[教學] 常用USER-AGENT清單aotSogclubhkmciLineag1relay[前往][前往][教學] Windows 10 Wifi 斷線問題解決[前往][前往]hills-selectQuyushuju161forum[前往][前往]Mmluna2tcan2050axiangtiktokWkbilibili[前往]hermesmydhlplus.dhle-muse[前往]IceDriveinnovue.ltd[前往]歸檔星球Zghncygjtaiwanhttp://as2026.wuaze.com/[前往][教學] DNS-over-HTTPS (DoH)yyml[前往]PSE[前往][前往]cd.hwxnet[教學] IPZ影片來源連接ftnn[教學] Windows 10上使用FAT32[前往][前往][前往]Chip123lotsmallTiancaisqbbarlocktruu[前往]Copilotjubo-health[前往]jcdqzdhSstt1825soapNiagarachinese[資料] 愛情觀心理測驗costco[前往]dungdong[教學] 駭客來源網域清單[前往]elementalcraft[教學] 8種真實拐騙去柬埔寨手法zdic[前往][前往]WMHPIT TOP Blog