CNNVD-ID编号 | CNNVD-201909-1264 | CVE编号 | CVE-2019-16869 |
发布时间 | 2019-09-26 | 更新时间 | 2021-01-27 |
漏洞类型 | 环境问题 | 漏洞来源 | Ubuntu,Debian,Red Hat |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。
Netty 4.1.42.Final之前版本中存在安全漏洞。攻击者可利用该漏洞实施HTTP请求走私攻击。
目前厂商已发布升级了Netty 环境问题漏洞的补丁,Netty 环境问题漏洞的补丁获取链接:
https://github.com/netty/netty/issues/9571
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:REDHAT
来源:REDHAT
来源:MLIST
来源:REDHAT
来源:REDHAT
来源:MLIST
来源:MLIST
来源:REDHAT
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:github.com
来源:github.com
链接:https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final
来源:MLIST
来源:MLIST
来源:UBUNTU
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:DEBIAN
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:REDHAT
来源:BUGTRAQ
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html
来源:MLIST
来源:MLIST
来源:REDHAT
来源:MLIST
来源:MLIST
来源:access.redhat.com
来源:www.debian.org
来源:access.redhat.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:access.redhat.com
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
来源:access.redhat.com
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155382/Red-Hat-Security-Advisory-2019-3901-01.html
来源:www.ibm.com
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157214/Red-Hat-Security-Advisory-2020-1445-01.html
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157859/Red-Hat-Security-Advisory-2020-2333-01.html
来源:www.ibm.com
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156852/Red-Hat-Security-Advisory-2020-0922-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155845/Debian-Security-Advisory-4597-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158651/Red-Hat-Security-Advisory-2020-3197-01.html
来源:nvd.nist.gov
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Netty-information-disclosure-via-HTTP-Request-Smuggling-30480
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156241/Red-Hat-Security-Advisory-2020-0445-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:http-tcp-proxy-component-in-rational-test-virtualization-server-and-rational-test-workbench-affected-by-netty-vulnerabilities-cve-2020-7238-cve-2019-16
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-rational-integration-tester-
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155352/Red-Hat-Security-Advisory-2019-3892-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156011/Red-Hat-Security-Advisory-2020-0159-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159269/Ubuntu-Security-Notice-USN-4532-1.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157835/Red-Hat-Security-Advisory-2020-2321-01.html
暂无