JSEMTS搜尋引擎
 

Subject: [UNIX] Backdoor Password in Red Hat Linux Virtual Server Package Date: Wed, 26 Apr 2000 00:34:02 +0200 Backdoor Password in Red Hat Linux Virtual Server Package -------------------------------------------------------------------------------- SUMMARY Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server. DETAILS Impact: With this backdoor password, an attacker could compromise the web server as well as deface and destroy the web site. Affected Versions: Piranha is distributed in three Red Hat Package Managers (RPMs): "piranha", "piranha-gui", and "piranha-docs". The vulnerability is present if version 0.4.12 of piranha-gui is installed. The current distribution of Red Hat Linux 6.2 distribution is vulnerable. Earlier versions of the Red Hat distribution do not contain this vulnerability. Description: Piranha is a collection of utilities used to administer the Linux Virtual Server. LVS is a scalable and highly available server designed for large enterprise environments. It allows seamless clustering of multiple web servers through load balancing, heartbeat monitoring, redundancy, and fail-over protection. To the end user, the entire system is completely transparent, appearing as if a single server is fielding every request. Piranha is shipped with a web-based GUI that allows system administrators to configure and monitor the cluster. The Piranha package contains an undocumented backdoor account and password that may allow a remote attacker access to the LVS web administration tools. Attackers could use these tools to cause the interface to execute arbitrary commands against the server. Commands are executed with the same privilege level of the web server, which varies based on the configuration of the system. The vulnerability is present even if the LVS service is not used on the system. If the affected "piranha-gui" package is installed and the password has not been changed by the administrator, the system is vulnerable. Recommendations: Red Hat has provided updated piranha, piranha-doc, and piranha-gui packages 0.4.13-1. ISS X-Force recommends that these patches be installed immediately. The updated piranha-gui package addresses the password and arbitrary command execution vulnerability. After upgrading to piranha 0.4.13-1 users should ensure that a password is set by logging into the piranha web gui and setting one. The updated packages are available on ftp://updates.redhat.com/6.2, and their version number is 0.4.13-1. ADDITIONAL INFORMATION The information was provided by: X-Force. ==================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=4133843 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1423339 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1421169 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=1905110 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=9541829 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=4331325 flyscoothttp://jplop-ki9.softether.net/nike[前往]logitechnewhopefoodYoutube[前往]simbahttp://samsung.rueychyuan.com.tw/?site=1ShortUrltwbsball.dils.tku學生貸款學生貸款[前往][前往]hills-select[前往][前往]kbto70fsalesforce[前往]lepont歸檔星球uggroborocktw[前往]fundrichwavenetTeraBoxtransglobeWeebly[前往]專業扶手廠商專業扶手廠商[前往]lovettcreationsibm[前往]sextea333[前往][教學] 台灣疑似已被駭客入侵的網站列表(domain2multi-tw)[前往]niar[教學] Smart Port Forwarding[前往]railspark[機密] 會員名單Guangguelearning.tafmerbcopilot.microsoft[教學] IOT學習筆記 ─ 使用Arduino ESP32Zzbjtku.fandom[前往]HolkeewwunionFitClubXiangtoushuWusoPinkCorpsewncSsjyw歸檔星球[前往]bilibiliXocatKickResume[前往][教學] 字串去除尾巴工具jubo-health[前往]New182narukoydcoating[前往]Ninini573r[教學] 基於 Cheat Engine DBVM 的低層級記憶體存取技術分析[前往]Lineag1Chinesecj[前往]Vanquishloong[前往][前往][前往]minfishOsho[前往][分享] 網友分享作品[前往][前往]PopDailyWin1Unaux 1[教學] EXpansion - Message Digest v2(ex_md2)Phoenixstoneage[前往]blogdomagohttp://tomco-2023.softether.net/tinhdoanbinhphuoc.vnrakuyaFirstoryd1-dm.online1on1felo.ai[前往]歸檔星球hcl-softwareglintscd.hwxnet[前往]wtmec[前往][前往][前往]beauty321insidertodayhahow.inxn--kbto70f[技術] Word 2007在Win 10出現記憶體不足問題解決enlightcorp75oneyomixtaitung.pink668adimargaret[前往]性向測試[前往]thinkwithgoogleNxtc86bbk[前往]世界之眼 blogspot世界之眼 blogspot[前往][技術] LibreOffice卡頓問題解決[前往]Fossicsenheyuan[前往][分享] 什麼是SCIgshop[前往]hurrybuyLUrl[前往][前往]http://as2026.wuaze.com/70thvictoryZohopublicxjj1ikea[前往][前往][前往][技術] 筆電加速開機,Lenovo IdeaPad L340[前往]allyounghttp://archives.rf.gd/[前往][教學] 螢幕解析度(2K,4K,8K)[技術] N網的「神的語言」現象研究:二次元數位社群中的符號實踐與文化認同AeustOdyseecm-petqiaoxiaojunclaude.aifg.tpgapacctonICloud[前往]OurSOGO[前往]1976[前往]mosanime1tnfshwiki.tfcis21tian[前往]ultima-alianzaOptionShare[前往]gandihttp://googledrive.asuscomm.com/tyciis[前往]nuttynutssanyangPlurkMD5 Decodeaws.amazonStatic.App[教學] Windows 家用版開啟 Hyper-Vgloria-eyeweartecom[前往]courses[前往]isupermankkday[前往]clarins3dmats[前往]Lslv168fortunecity.ws[前往]jiufengls[前往]Dmhg[前往][前往][前往][教學] 3ds Max 啟動後閃退解決方法貸款貸款[前往][分享] 利用機器學習檢測網絡釣魚攻擊[前往]Jslt28[前往]cgmh[前往]jinhappy[前往]mitsuifudosangiving.ucsd[前往]1010apothecaryhongkongdisneyland[前往]快速架站6666line[前往]New3lunchario[前往]Idcpferkle64[前往]525cganime1[前往][前往]microsoftasp01.ez-showhaola[前往]Waterloochinese[前往]usjUDNcdnsweb.piapp[前往]Yqwmlsanjing3czdiccitytalksmctwplain-meSeasgod2000fun[前往][分享] 工研院的老闆許友耕在65歲生日感言simularsikaer[分享] 台灣百家姓[前往][前往]PCloud[教學] 下雪特效[前往][前往]TwMiniLvziku[技術] Windows10消腫教學X7cqgngChip123citecwbook[教學] 執行檔簽名方式Xiaodingdonghome.gameramtophttp://jplop2.float-zone.com/cpok[教學] JavaScript速查[前往]lineage182lioncrew.uni-lions[前往]twhowtoallwinningBestLongrelayPusacgn[前往]yuejia100IT TOP Blog