【安全公告:UTSA-2023-000761】-【CVE-2020-7663】

发布日期:2023-03-20

基本信息

漏洞编号: CVE-2020-7663

受影响系统版本: 服务器D版

受影响源码包: ruby-websocket-extensions

修复版本: 0.1.2-1+deb10u1

CWE编号: None

漏洞等级: 高危

CVSS_v3评分: 7.5

漏洞描述

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

修复方式

sudo apt update && sudo apt dist-upgrade

是否受影响判断

判断方法:apt policy PackageName
结果说明:版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复。

补丁链接

暂无