CN108154033A - A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information - Google Patents

A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information Download PDF

Info

Publication number
CN108154033A
CN108154033A CN201711158562.9A CN201711158562A CN108154033A CN 108154033 A CN108154033 A CN 108154033A CN 201711158562 A CN201711158562 A CN 201711158562A CN 108154033 A CN108154033 A CN 108154033A
Authority
CN
China
Prior art keywords
application program
general purpose
purpose application
host
loophole
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711158562.9A
Other languages
Chinese (zh)
Inventor
王贺
李颉杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201711158562.9A priority Critical patent/CN108154033A/en
Publication of CN108154033A publication Critical patent/CN108154033A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The method and device of administrative vulnerability information provided by the invention, belongs to computer realm.This method includes:Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;The vulnerability information of general purpose application program is obtained, the mark of general purpose application program and the latest edition number of general purpose application program are extracted from vulnerability information;For each host in each host, according to the identifying of general purpose application program each in the host, the latest edition number of version number and each general purpose application program of each general purpose application program in the host, determine whether each general purpose application program needs to carry out loophole reparation, if there is the general purpose application program for needing to carry out loophole reparation in each general purpose application program, it is determined that the host is the destination host for needing to carry out loophole reparation;It exports the corresponding loophole of destination host and repairs prompt message.The efficiency for repairing universal loophole can be improved using the present invention.

Description

A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information
Technical field
The present invention relates to computer realm, more particularly to a kind of method, apparatus of administrative vulnerability information, electronic equipment and deposit Storage media.
Background technology
With the development of science and technology, a fairly large number of host can be configured in most of company, number is installed on these hosts According to general purpose application programs such as library, OFFICE office softwares.Since general purpose application program written in code is not perfect, these common applications Program is likely to occur loophole (can be described as universal loophole), and leading to host, there are risks.Therefore, it is necessary to these universal loopholes It is repaired.
At present, when the host in server breaks out universal loophole, it usually needs manually write out attack load (payload), based on attack load generation plug-in type scanner, then using plug-in type scanner to the common application in host Program is scanned, and obtains which general purpose application program be mounted on host.Then it manually announces from vulnerability information and is obtained on website Take these installed general purpose application programs vulnerability information (vulnerability information generally include title (title) and The parts such as description (description), title and description be used for describe vulnerability information influence common application into Mark cve labels corresponding with the general purpose application program, vulnerability information also typically include the latest edition of general purpose application program Number).Technical staff is by comparing general purpose application program in version number of the general purpose application program in the host and vulnerability information Latest edition number, determine whether the general purpose application program in host is compared with lowest version, if compared with lowest version, is then needed Loophole reparation is carried out to the general purpose application program.Cve number of the last technical staff in vulnerability information, from each announcement loophole Download flaw patch in official's server of patch, then these loophole patch are installed to corresponding host In, carry out loophole reparation.
However, the method for above-mentioned administrative vulnerability information, it is each there is new universal loophole when, more than each step will Artificial repetitive operation causes loophole remediation efficiency low.
Invention content
The embodiment of the present invention is designed to provide a kind of method, apparatus, electronic equipment and the storage of administrative vulnerability information Medium can improve the efficiency for repairing universal loophole.Specific technical solution is as follows:
In a first aspect, a kind of method of administrative vulnerability information is provided, the method includes:
Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;
The vulnerability information of each general purpose application program is crawled from the network server of publication vulnerability information, from the leakage The mark of the general purpose application program and the latest edition number of the general purpose application program are extracted in the information of hole;
For each host in each host, according to the identifying of general purpose application program each in the host, described each logical With version number of the application program in the host and the latest edition number of each general purpose application program, determine it is described it is each it is general should Whether needed to carry out loophole reparation with program, if in each general purpose application program existing needs to carry out the general of loophole reparation Application program, it is determined that the host is the destination host for needing to carry out loophole reparation;
According to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, each destination host is exported Corresponding loophole repairs prompt message.
Optionally, it is described according to the identifying of general purpose application program each in the host, each general purpose application program is in the master The latest edition number of version number and each general purpose application program in machine, determine each general purpose application program whether need into Row loophole reparation, including:
For any general purpose application program, according to preset version number's comparison rule, judge the general purpose application program in institute Whether the version number in generic is less than the latest edition number of the general purpose application program, if it is, judging the common application journey Sequence is the target general purpose application program for needing to carry out loophole reparation;If it is not, then judge the general purpose application program do not need into Row loophole reparation.
Optionally, it is described according to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, export institute It states the corresponding loophole of each destination host and repairs prompt message, including:
According to preset canonical matching algorithm and the vulnerability information, the common application journey for needing to carry out loophole reparation is determined The corresponding public loophole of sequence and exposure cve are numbered;
According to cve numbers and the mark of the destination host, generate the corresponding loophole reparation of the destination host and carry Show information;
It exports the corresponding loophole of the destination host and repairs prompt message.
Optionally, the loophole letter that each general purpose application program is crawled from the network server of publication vulnerability information Breath, including:
According to the keyword in the mark of preset each general purpose application program, from the network service of publication vulnerability information The vulnerability information for including the keyword is crawled in device, obtains the vulnerability information of each general purpose application program.
Optionally, the mark for obtaining the general purpose application program in each host and each general purpose application program are in institute's generic In version number, including:
The mark of general purpose application program in each host is obtained by network mapping device nmap and each general purpose application program exists Version number in institute's generic.
Second aspect, provides a kind of device of administrative vulnerability information, and described device includes:
Acquisition module, for obtaining the mark of the general purpose application program in each host and each general purpose application program in institute owner Version number in machine;
Extraction module, for crawling the loophole of each general purpose application program from the network server of publication vulnerability information Information extracts the mark of the general purpose application program and the latest edition of the general purpose application program from the vulnerability information Number;
First determining module, for for each host in each host, according to common application journey each in the host The identifying of sequence, the latest edition of version number and each general purpose application program of each general purpose application program in the host Number, determine whether each general purpose application program needs to carry out loophole reparation, if existing in each general purpose application program needs Carry out the general purpose application program of loophole reparation, it is determined that the host is the destination host for needing to carry out loophole reparation;
First output module, for according to each destination host it is corresponding need carry out loophole reparation general purpose application program, It exports the corresponding loophole of each destination host and repairs prompt message.
Optionally, the determining module, is additionally operable to:
For any general purpose application program, according to preset version number's comparison rule, judge the general purpose application program in institute Whether the version number in generic is less than the latest edition number of the general purpose application program, if it is, judging the common application journey Sequence is the target general purpose application program for needing to carry out loophole reparation;If it is not, then judge the general purpose application program do not need into Row loophole reparation.
Optionally, first output module, including:
Second determining module, for according to preset canonical matching algorithm and the vulnerability information, determining to be leaked The corresponding public loophole of general purpose application program and exposure cve that hole is repaired are numbered;
Generation module for the mark according to cve numbers and the destination host, generates the destination host and corresponds to Loophole repair prompt message;
Second output module repairs prompt message for exporting the corresponding loophole of the destination host.
Optionally, the extraction module, is additionally operable to:
According to the keyword in the mark of preset each general purpose application program, from the network service of publication vulnerability information The vulnerability information for including the keyword is crawled in device, obtains the vulnerability information of each general purpose application program.
Optionally, the acquisition module, is additionally operable to:
The mark of general purpose application program in each host is obtained by network mapping device nmap and each general purpose application program exists Version number in institute's generic.
The third aspect, provides a kind of electronic equipment, the electronic equipment include processor, communication interface, memory and Communication bus, wherein, the processor, the communication interface, the memory is completed mutual by the communication bus Communication;
The memory, for storing computer program;
The processor during for performing the program stored on the memory, is realized described in above-mentioned first aspect The method and step of administrative vulnerability information.
Fourth aspect, provides a kind of computer readable storage medium, and the computer readable storage medium memory contains Computer program, the computer program realize the side of the administrative vulnerability information described in above-mentioned first aspect when being executed by processor Method step.
Method, apparatus, electronic equipment and the storage medium of a kind of administrative vulnerability information provided in an embodiment of the present invention, pass through Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;Then from hair The vulnerability information of each general purpose application program is crawled in the network server of cloth vulnerability information, common application is extracted from vulnerability information The mark of program and the latest edition number of general purpose application program;For each host in each host, according to each logical in the host With the identifying of application program, the latest edition of version number and each general purpose application program of each general purpose application program in the host Number, it determines whether each general purpose application program needs to carry out loophole reparation, is leaked if existed in each general purpose application program The general purpose application program that hole is repaired, it is determined that the host is the destination host for needing to carry out loophole reparation;Finally according to each target The corresponding general purpose application program for needing to carry out loophole reparation of host exports the corresponding loophole reparation prompting letter of each destination host Breath.Using the method for administrative vulnerability information provided by the invention, the mark of the general purpose application program in each host can be obtained automatically Knowledge and version number of each general purpose application program in institute's generic, and obtain these from the network server of publication vulnerability information Then the vulnerability information of general purpose application program just can determine that needs by comparing the version number of each general purpose application program in each host The destination host of loophole reparation is carried out, the corresponding loophole of destination host is finally exported and repairs prompt message.In this way, without manually into Row above-mentioned steps can improve the efficiency for repairing universal loophole.Certainly, implement any of the products of the present invention or method not necessarily It needs to reach all the above advantage simultaneously.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described.
Fig. 1 is a kind of method flow diagram of administrative vulnerability information of the embodiment of the present invention;
Fig. 2 is a kind of apparatus structure schematic diagram of administrative vulnerability information of the embodiment of the present invention;
Fig. 3 is the structure diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is described.
The embodiment of the invention discloses a kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information, below It is described in detail respectively.The executive agent of this method can be any one host in each host in server or again A host (being properly termed as managing main frame) being newly configured, the managing main frame can manage each host (including managing main frame sheet Body and other each host).
As shown in FIG. 1, FIG. 1 is a kind of method flow diagram of administrative vulnerability information of the embodiment of the present invention, including walking as follows Suddenly:
Step 101, obtain each general purpose application program in each host mark and general purpose application program in institute's generic Version number.
In force, master can be managed with general purpose application programs such as installation database, OFFICE office softwares in every host Machine can obtain the mark of general purpose application program installed in each host, for example, the title of general purpose application program can be obtained, Or the keyword of the title of the general purpose application program is obtained, managing main frame can also obtain each general purpose application program in institute owner The information such as the version number in machine.Managing main frame is getting the mark of the general purpose application program of each host and each common application journey After version number of the sequence in institute's generic, the mark of each host and the information of the general purpose application program in the host can be carried out Corresponding storage.The mark of host can be the IP (Internet Protocol, the agreement interconnected between network) of the host Location or the number for distinguishing the host.
Step 102, the vulnerability information of general purpose application program is crawled from the network server of publication vulnerability information, from loophole The mark of general purpose application program and the latest edition number of general purpose application program are extracted in information.
In force, many network servers can store the vulnerability information of each general purpose application program, for example, http:// Www.seebug.org/rss/new and https:The server of the website links such as //www.exploit-db.com/rss.xml. Managing main frame can crawl the corresponding leakage of each general purpose application program respectively from the network server of these publication vulnerability informations Hole information, for any general purpose application program, vulnerability information includes the parts such as title and description, title and Description be used for describe the vulnerability information influence common application into mark cve corresponding with the general purpose application program Label, vulnerability information also typically include the latest edition number of general purpose application program.
Step 103, for each host in each host, according to the identifying of general purpose application program each in the host, each logical With version number of the application program in the host and the latest edition number of each general purpose application program, determine that each general purpose application program is It is no to need to carry out loophole reparation, if there is the general purpose application program for needing to carry out loophole reparation in each general purpose application program, It is the destination host for needing to carry out loophole reparation to determine the host.
In force, managing main frame can one by one be detected every host after vulnerability information is obtained.For every Host, by version number of each general purpose application program in the host in the host and the latest edition number of each general purpose application program It is compared, determines whether each general purpose application program in every host needs to carry out loophole reparation, if had in some host The general purpose application program of progress loophole reparation is needed, then the host needs to carry out loophole reparation;It is if each general in the host Application program does not all need to carry out loophole reparation, then the host does not need to carry out loophole reparation.After destination host is determined, management Host can be by the identifying of each general purpose application program for needing to carry out loophole reparation in destination host and the host, each common application The corresponding preservation of latest edition number of version number and each general purpose application program of the program in the host is in the database.
Step 104, according to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, each target is exported The corresponding loophole of host repairs prompt message.
In force, managing main frame, can be according to the mark of destination host and destination host pair after destination host is determined The vulnerability information answered, the corresponding loophole of generation destination host repair prompt message, these loopholes then are repaired prompt message hair It is sent in the management terminal of administrative staff.For example, loophole is repaired prompt message hair by managing main frame in a manner of mail or short message etc. It is sent on the mailbox or mobile phone of administrative staff, so that administrative staff is allowed to know, which of which platform host is general purpose application program needs Carry out loophole reparation.
It optionally, can be according to pre- when whether the general purpose application program in determining each host needs to carry out loophole reparation If version number's comparison rule, judge version number of the general purpose application program in institute's generic whether be less than the common application journey The latest edition number of sequence, if it is, judging target common application journey of the general purpose application program to need progress loophole reparation Sequence;If it is not, then judge that the general purpose application program does not need to carry out loophole reparation.
In force, for any general purpose application program, can by comparing the general program institute's generic version Number and the general purpose application program latest edition number, come determine the general purpose application program whether need carry out loophole reparation.Wherein, Version number's comparison rule can be diversified.For example, version number can be made of number and spaced points, these number priorities The sequence of grade is from left to right to continuously decrease, and at this moment preset version number's comparison rule can be:By comparing version number successively In number, come determine same general purpose application program institute's generic version number whether be less than the general purpose application program most New version number, if it is, judging target general purpose application program of the general purpose application program to need progress loophole reparation;If It is not then to judge that the general purpose application program does not need to carry out loophole reparation.Alternatively, version number is individual number, at this moment version Number comparison rule can directly compare the number of version number, to determine whether general purpose application program needs to carry out loophole reparation.
It (is made of for example, version number of some general purpose application program in some host is 3.1 number and spaced points ), the general purpose application program is corresponding in the vulnerability information that obtains from the network server of publication vulnerability information for managing main frame Version number is 3.2 (being made of number and spaced points), and preset version number's comparison rule first compares the two version numbers Highest priority position corresponding 3 since corresponding two data of highest order are equal, is then followed by comparing the number that priority is taken second place Word at this moment since 1 is less than 2, then judges that version number 3.1 is less than version number 3.2, i.e., the common application journey of 3.1 versions in the host Sequence needs to carry out loophole reparation.When version number is individual number, such as Liang Ge version numbers are 4.0 and 3.6 respectively, at this moment version This number comparison rule by comparing the two numerical value size, it may be determined that 4.0 be higher version, if general in host The version number of application program is 4.0, and the corresponding version number of vulnerability information is 3.6, then the general purpose application program does not need to be leaked It repairs in hole;If the version number of the general purpose application program in host is 3.6, the corresponding version number of vulnerability information is 4.0, then this is logical It is needed to carry out loophole reparation with application program.
In scheme provided in an embodiment of the present invention, since general purpose application program is after loophole reparation is carried out, version number's meeting It updates therewith, it is therefore possible to use compare the mode of version number to determine whether general purpose application program needs to carry out loophole reparation, It can quickly determine that the general purpose application program of which version needs to carry out loophole reparation in this way, so as to improve loophole remediation efficiency.
Optionally, managing main frame can determine to need to carry out loophole by preset canonical matching algorithm and vulnerability information The corresponding public loophole of general purpose application program and exposure cve of reparation are numbered;Then according to cve numbers and the mark of destination host Know, the corresponding loophole of generation destination host repairs prompt message;Finally the corresponding loophole of output destination host repairs prompt message.
In force, after managing main frame determines destination host, can obtain needs progress loophole to repair in the destination host The corresponding cve numbers of multiple general purpose application program.The title and description of vulnerability information generally include cve numbers, in advance If canonical matching algorithm can matching be detected in the title and description to vulnerability information by keyword, when When detecting cve numbers, then cve numbers are extracted.Then, managing main frame is numbered according to cve and the mark of the destination host is given birth to It is repaired in prompt message, then the terminal of management that loophole reparation prompt message is sent to administrative staff into loophole.
In scheme provided in an embodiment of the present invention, loophole repair prompt message including host mark and host in need into The corresponding cve labels of each general purpose application program of row loophole reparation, the staff of such managing main frame carry according to loophole reparation Show that information can quickly determine which host needs to carry out loophole reparation, and which common application journey in these hosts known Sequence needs to carry out loophole reparation, these general purpose application programs need the loophole patch for carrying out loophole reparation can be according to each logical It is downloaded from each official's server for announcing loophole patch with the corresponding cve numbers of application program.
Optionally, managing main frame can be leaked according to the keyword in the mark of preset each general purpose application program from publication The vulnerability information comprising the keyword is crawled in the network server of hole information.
In force, the title and description of vulnerability information generally include the mark or logical of general purpose application program With the keyword in the mark of application, managing main frame can be (a kind of by chromium headless according to these keywords The title of browser) browser without a head such as browser or phantom (a kind of title of browser) without a head is from publication loophole letter The vulnerability information including these keywords is crawled in the network server of breath.
In scheme provided in an embodiment of the present invention, loophole is obtained by the keyword in the mark of general purpose application program and is believed Breath can rapidly extract the corresponding loophole letter of installed general program in host from numerous vulnerability informations in this way Breath improves the efficiency for obtaining vulnerability information.
Optionally, managing main frame can be obtained by network mapping device (Network Mapper, nmap) in each host Version number of the mark and general purpose application program of each general purpose application program in institute's generic.
In force, managing main frame periodically can be scanned a host according to the preset period by nmap, obtain Which general purpose application program be mounted with to each host, and obtains the mark and these general purpose application programs of these general purpose application programs Version number in institute's generic.The information of this acquisition after these information are obtained, is stored in data by managing main frame every time In library, and by the mark of each general purpose application program in each host obtained before and general purpose application program in institute's generic Version number information is deleted.
In scheme provided in an embodiment of the present invention, the mark of each general purpose application program in each host can be obtained by nmap Knowledge and version number of the general purpose application program in institute's generic, and when nmap is used to obtain the information of each host, Bu Huiying Ring the normal operation of each host.
The method of a kind of administrative vulnerability information provided in an embodiment of the present invention, by obtaining the common application journey in each host The mark of sequence and version number of each general purpose application program in institute's generic;Then from the network server of publication vulnerability information The vulnerability information of each general purpose application program is crawled, the mark and general purpose application program of general purpose application program are extracted from vulnerability information Latest edition number;For each host in each host, according to the identifying of general purpose application program each in the host, it is each it is general should With version number of the program in the host and the latest edition number of each general purpose application program, determine whether each general purpose application program needs Loophole reparation is carried out, if there is the general purpose application program for needing to carry out loophole reparation in each general purpose application program, it is determined that The host is the destination host for needing to carry out loophole reparation;Finally need to carry out loophole reparation according to each destination host is corresponding General purpose application program exports the corresponding loophole of each destination host and repairs prompt message.Believe using administrative vulnerability provided by the invention The method of breath, can obtain automatically general purpose application program in each host mark and each general purpose application program in institute's generic Version number, and the vulnerability informations of these general purpose application programs, Ran Houtong are obtained from the network server of publication vulnerability information The version number for crossing each general purpose application program in more each host just can determine that the destination host for needing to carry out loophole reparation, last defeated Go out the corresponding loophole of destination host and repair prompt message.In this way, without manually carrying out above-mentioned steps, it is universal that reparation can be improved The efficiency of loophole.
Based on identical technical concept, corresponding to embodiment of the method shown in Fig. 1, the embodiment of the present invention additionally provides a kind of pipe The device of vulnerability information is managed, as shown in Fig. 2, the device includes:
Acquisition module 201, for obtaining the mark of the general purpose application program in each host and each general purpose application program in institute Version number in generic;
Extraction module 202, for crawling each general purpose application program from the network server of publication vulnerability information Vulnerability information extracts the mark of the general purpose application program and the latest edition of the general purpose application program from the vulnerability information This number;
First determining module 203, for for each host in each host, according to common application each in the host The identifying of program, the latest edition of version number and each general purpose application program of each general purpose application program in the host Number, determine whether each general purpose application program needs to carry out loophole reparation, if existing in each general purpose application program needs Carry out the general purpose application program of loophole reparation, it is determined that the host is the destination host for needing to carry out loophole reparation;
First output module 204, for according to the corresponding common application journey for needing to carry out loophole reparation of each destination host Sequence exports the corresponding loophole of each destination host and repairs prompt message.
Optionally, the determining module, is additionally operable to:
For any general purpose application program, according to preset version number's comparison rule, judge the general purpose application program in institute Whether the version number in generic is less than the latest edition number of the general purpose application program, if it is, judging the common application journey Sequence is the target general purpose application program for needing to carry out loophole reparation;If it is not, then judge the general purpose application program do not need into Row loophole reparation.
In scheme provided in an embodiment of the present invention, since general purpose application program is after loophole reparation is carried out, version number's meeting It updates therewith, it is therefore possible to use compare the mode of version number to determine whether general purpose application program needs to carry out loophole reparation, It can quickly determine that the general purpose application program of which version needs to carry out loophole reparation in this way, so as to improve loophole remediation efficiency.
Optionally, first output module, including:
Second determining module, for according to preset canonical matching algorithm and the vulnerability information, determining to be leaked The corresponding public loophole of general purpose application program and exposure cve that hole is repaired are numbered;
Generation module for the mark according to cve numbers and the destination host, generates the destination host and corresponds to Loophole repair prompt message;
Second output module repairs prompt message for exporting the corresponding loophole of the destination host.
In scheme provided in an embodiment of the present invention, loophole repair prompt message including host mark and host in need into The corresponding cve labels of each general purpose application program of row loophole reparation, the staff of such managing main frame carry according to loophole reparation Show that information can quickly determine which host needs to carry out loophole reparation, and which common application journey in these hosts known Sequence needs to carry out loophole reparation, these general purpose application programs need the loophole patch for carrying out loophole reparation can be according to each logical It is downloaded from each official's server for announcing loophole patch with the corresponding cve numbers of application program.
Optionally, the extraction module, is additionally operable to:
According to the keyword in the mark of preset each general purpose application program, from the network service of publication vulnerability information The vulnerability information for including the keyword is crawled in device, obtains the vulnerability information of each general purpose application program.
In scheme provided in an embodiment of the present invention, loophole is obtained by the keyword in the mark of general purpose application program and is believed Breath can rapidly extract the corresponding loophole letter of installed general program in host from numerous vulnerability informations in this way Breath improves the efficiency for obtaining vulnerability information.
Optionally, the acquisition module, is additionally operable to:
The mark of general purpose application program in each host is obtained by network mapping device nmap and each general purpose application program exists Version number in institute's generic.
In scheme provided in an embodiment of the present invention, the mark of each general purpose application program in each host can be obtained by nmap Knowledge and version number of the general purpose application program in institute's generic, and when nmap is used to obtain the information of each host, Bu Huiying Ring the normal operation of each host.
The device of a kind of administrative vulnerability information provided in an embodiment of the present invention, by obtaining the common application journey in each host The mark of sequence and version number of each general purpose application program in institute's generic;Then from the network server of publication vulnerability information The vulnerability information of each general purpose application program is crawled, the mark and general purpose application program of general purpose application program are extracted from vulnerability information Latest edition number;For each host in each host, according to the identifying of general purpose application program each in the host, it is each it is general should With version number of the program in the host and the latest edition number of each general purpose application program, determine whether each general purpose application program needs Loophole reparation is carried out, if there is the general purpose application program for needing to carry out loophole reparation in each general purpose application program, it is determined that The host is the destination host for needing to carry out loophole reparation;Finally need to carry out loophole reparation according to each destination host is corresponding General purpose application program exports the corresponding loophole of each destination host and repairs prompt message.Believe using administrative vulnerability provided by the invention The method of breath, can obtain automatically general purpose application program in each host mark and each general purpose application program in institute's generic Version number, and the vulnerability informations of these general purpose application programs, Ran Houtong are obtained from the network server of publication vulnerability information The version number for crossing each general purpose application program in more each host just can determine that the destination host for needing to carry out loophole reparation, last defeated Go out the corresponding loophole of destination host and repair prompt message.In this way, without manually carrying out above-mentioned steps, it is universal that reparation can be improved The efficiency of loophole.
The embodiment of the present invention additionally provides a kind of electronic equipment, as shown in figure 3, including processor 301, communication interface 302, Memory 303 and communication bus 304, wherein, processor 301, communication interface 302, memory 303 is complete by communication bus 304 Into mutual communication;
Memory 303, for storing computer program;
Processor 301 during for performing the program stored on memory 303, realizes pipe provided in an embodiment of the present invention The method for managing vulnerability information.
Specifically, the method for above-mentioned administrative vulnerability information, including:
Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;
The vulnerability information of each general purpose application program is crawled from the network server of publication vulnerability information, from the leakage The mark of the general purpose application program and the latest edition number of the general purpose application program are extracted in the information of hole;
For each host in each host, according to the identifying of general purpose application program each in the host, described each logical With version number of the application program in the host and the latest edition number of each general purpose application program, determine it is described it is each it is general should Whether needed to carry out loophole reparation with program, if in each general purpose application program existing needs to carry out the general of loophole reparation Application program, it is determined that the host is the destination host for needing to carry out loophole reparation;
According to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, each destination host is exported Corresponding loophole repairs prompt message.
It should be noted that other realization methods of the method for above-mentioned administrative vulnerability information and preceding method embodiment part Identical, which is not described herein again.
The communication bus of above-mentioned electronic equipment can be Peripheral Component Interconnect standard (Peripheral ComponentInterconnect, abbreviation PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, abbreviation EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control Bus processed etc..It for ease of representing, is only represented in figure with a thick line, it is not intended that an only bus or a type of total Line.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory can include random access memory (Random Access Memory, abbreviation RAM), can also include Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.Optionally, memory may be used also To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, Abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), application-specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), field programmable gate array (Field Programmable Gate Array, Abbreviation FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.
In another embodiment provided by the invention, a kind of computer readable storage medium is additionally provided, which can It reads to be stored with instruction in storage medium, when run on a computer so that computer performs any institute in above-described embodiment The method of administrative vulnerability information stated.
In another embodiment provided by the invention, a kind of computer program product for including instruction is additionally provided, when it When running on computers so that the method that computer performs any administrative vulnerability information in above-described embodiment.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its arbitrary combination real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When loading on computers and performing the computer program instructions, all or It partly generates according to the flow or function described in the embodiment of the present invention.The computer can be all-purpose computer, special meter Calculation machine, computer network or other programmable devices.The computer instruction can be stored in computer readable storage medium In or from a computer readable storage medium to another computer readable storage medium transmit, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is the data storage devices such as server, the data center integrated comprising one or more usable mediums.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state disk Solid State Disk (SSD)) etc..
Method, apparatus, electronic equipment and the storage medium of a kind of administrative vulnerability information provided in an embodiment of the present invention, pass through Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;Then from hair The vulnerability information of each general purpose application program is crawled in the network server of cloth vulnerability information, common application is extracted from vulnerability information The mark of program and the latest edition number of general purpose application program;For each host in each host, according to each logical in the host With the identifying of application program, the latest edition of version number and each general purpose application program of each general purpose application program in the host Number, it determines whether each general purpose application program needs to carry out loophole reparation, is leaked if existed in each general purpose application program The general purpose application program that hole is repaired, it is determined that the host is the destination host for needing to carry out loophole reparation;Finally according to each target The corresponding general purpose application program for needing to carry out loophole reparation of host exports the corresponding loophole reparation prompting letter of each destination host Breath.Using the method for administrative vulnerability information provided by the invention, the mark of the general purpose application program in each host can be obtained automatically Knowledge and version number of each general purpose application program in institute's generic, and obtain these from the network server of publication vulnerability information Then the vulnerability information of general purpose application program just can determine that needs by comparing the version number of each general purpose application program in each host The destination host of loophole reparation is carried out, the corresponding loophole of destination host is finally exported and repairs prompt message.In this way, without manually into Row above-mentioned steps can improve the efficiency for repairing universal loophole.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any this practical relationship or sequence.Moreover, term " comprising ", "comprising" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those Element, but also including other elements that are not explicitly listed or further include as this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that Also there are other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is described using relevant mode, identical similar portion between each embodiment Point just to refer each other, and the highlights of each of the examples are difference from other examples.Especially for system reality For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.

Claims (12)

  1. A kind of 1. method of administrative vulnerability information, which is characterized in that the method includes:
    Obtain the mark of the general purpose application program in each host and version number of each general purpose application program in institute's generic;
    The vulnerability information of each general purpose application program is crawled from the network server of publication vulnerability information, is believed from the loophole The mark of the general purpose application program and the latest edition number of the general purpose application program are extracted in breath;
    For each host in each host, according to the identifying of general purpose application program each in the host, it is described it is each it is general should With version number of the program in the host and the latest edition number of each general purpose application program, each common application journey is determined Whether sequence needs to carry out loophole reparation, if there is the common application for needing to carry out loophole reparation in each general purpose application program Program, it is determined that the host is the destination host for needing to carry out loophole reparation;
    According to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, output each destination host corresponds to Loophole repair prompt message.
  2. 2. the according to the method described in claim 1, it is characterized in that, mark according to general purpose application program each in the host Know, the latest edition number of version number and each general purpose application program of each general purpose application program in the host, determine Whether each general purpose application program needs to carry out loophole reparation, including:
    For any general purpose application program, according to preset version number's comparison rule, judge the general purpose application program in institute owner Whether the version number in machine is less than the latest edition number of the general purpose application program, if it is, judging that the general purpose application program is Need the target general purpose application program of progress loophole reparation;If it is not, then judge that the general purpose application program does not need to be leaked It repairs in hole.
  3. 3. according to the method described in claim 1, it is characterized in that, described need to carry out loophole according to each destination host is corresponding The general purpose application program of reparation exports the corresponding loophole of each destination host and repairs prompt message, including:
    According to preset canonical matching algorithm and the vulnerability information, the general purpose application program pair for needing to carry out loophole reparation is determined The public loophole and exposure cve answered are numbered;
    According to cve numbers and the mark of the destination host, the corresponding loophole reparation prompting letter of the destination host is generated Breath;
    It exports the corresponding loophole of the destination host and repairs prompt message.
  4. 4. according to the method described in claim 1, it is characterized in that, described crawl from the network server of publication vulnerability information The vulnerability information of each general purpose application program, including:
    According to the keyword in the mark of preset each general purpose application program, from the network server of publication vulnerability information The vulnerability information for including the keyword is crawled, obtains the vulnerability information of each general purpose application program.
  5. 5. the according to the method described in claim 1, it is characterized in that, mark for obtaining the general purpose application program in each host With version number of each general purpose application program in institute's generic, including:
    By the mark and each general purpose application program of the general purpose application program in each host of network mapping device nmap acquisitions affiliated Version number in host.
  6. 6. a kind of device of administrative vulnerability information, which is characterized in that described device includes:
    Acquisition module, for obtaining the mark of the general purpose application program in each host and each general purpose application program in institute's generic Version number;
    Extraction module, for crawling the loophole letter of each general purpose application program from the network server of publication vulnerability information Breath extracts the mark of the general purpose application program and the latest edition number of the general purpose application program from the vulnerability information;
    First determining module, for for each host in each host, according to general purpose application program each in the host Mark, the latest edition number of version number and each general purpose application program of each general purpose application program in the host, really Whether fixed each general purpose application program needs to carry out loophole reparation, if existing in each general purpose application program needs to carry out The general purpose application program of loophole reparation, it is determined that the host is the destination host for needing to carry out loophole reparation;
    First output module, for according to the corresponding general purpose application program for needing to carry out loophole reparation of each destination host, output The corresponding loophole of each destination host repairs prompt message.
  7. 7. device according to claim 6, which is characterized in that the determining module is additionally operable to:
    For any general purpose application program, according to preset version number's comparison rule, judge the general purpose application program in institute owner Whether the version number in machine is less than the latest edition number of the general purpose application program, if it is, judging that the general purpose application program is Need the target general purpose application program of progress loophole reparation;If it is not, then judge that the general purpose application program does not need to be leaked It repairs in hole.
  8. 8. device according to claim 6, which is characterized in that first output module, including:
    Second determining module, for according to preset canonical matching algorithm and the vulnerability information, determining that progress loophole is needed to repair The corresponding public loophole of multiple general purpose application program and exposure cve are numbered;
    Generation module for the mark according to cve numbers and the destination host, generates the corresponding leakage of the destination host Repair prompt message in hole;
    Second output module repairs prompt message for exporting the corresponding loophole of the destination host.
  9. 9. device according to claim 6, which is characterized in that the extraction module is additionally operable to:
    According to the keyword in the mark of preset each general purpose application program, from the network server of publication vulnerability information The vulnerability information for including the keyword is crawled, obtains the vulnerability information of each general purpose application program.
  10. 10. device according to claim 6, which is characterized in that the acquisition module is additionally operable to:
    By the mark and each general purpose application program of the general purpose application program in each host of network mapping device nmap acquisitions affiliated Version number in host.
  11. 11. a kind of electronic equipment, which is characterized in that it is total that the electronic equipment includes processor, communication interface, memory and communication Line, wherein, the processor, the communication interface, the memory passes through the communication bus and completes mutual communication;
    The memory, for storing computer program;
    The processor during for performing the program stored on the memory, realizes any sides of claim 1-5 Method step.
  12. 12. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium memory contains computer Program realizes claim 1-5 any method and steps when the computer program is executed by processor.
CN201711158562.9A 2017-11-20 2017-11-20 A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information Pending CN108154033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711158562.9A CN108154033A (en) 2017-11-20 2017-11-20 A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711158562.9A CN108154033A (en) 2017-11-20 2017-11-20 A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information

Publications (1)

Publication Number Publication Date
CN108154033A true CN108154033A (en) 2018-06-12

Family

ID=62468035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711158562.9A Pending CN108154033A (en) 2017-11-20 2017-11-20 A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information

Country Status (1)

Country Link
CN (1) CN108154033A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542498A (en) * 2018-11-27 2019-03-29 郑州云海信息技术有限公司 A kind of method and apparatus for administrative vulnerability
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium
CN114996718A (en) * 2022-06-30 2022-09-02 浙江网商银行股份有限公司 Data processing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727337A (en) * 2008-10-24 2010-06-09 鸿富锦精密工业(深圳)有限公司 Electronic device with automatic software updating function and method
CN102541596A (en) * 2011-12-22 2012-07-04 中标软件有限公司 Operating system upgrading method and device
CN103473505A (en) * 2012-06-06 2013-12-25 腾讯科技(深圳)有限公司 Scanning prompt method and device for software vulnerabilities
CN106201607A (en) * 2016-07-04 2016-12-07 乐视控股(北京)有限公司 The upgrade method of a kind of software version and equipment
CN106503564A (en) * 2016-10-26 2017-03-15 上海携程商务有限公司 The discovery method and system of software vulnerability
CN106843933A (en) * 2016-12-27 2017-06-13 北京五八信息技术有限公司 A kind of leak restorative procedure of application program, mobile terminal and patch server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727337A (en) * 2008-10-24 2010-06-09 鸿富锦精密工业(深圳)有限公司 Electronic device with automatic software updating function and method
CN102541596A (en) * 2011-12-22 2012-07-04 中标软件有限公司 Operating system upgrading method and device
CN103473505A (en) * 2012-06-06 2013-12-25 腾讯科技(深圳)有限公司 Scanning prompt method and device for software vulnerabilities
CN106201607A (en) * 2016-07-04 2016-12-07 乐视控股(北京)有限公司 The upgrade method of a kind of software version and equipment
CN106503564A (en) * 2016-10-26 2017-03-15 上海携程商务有限公司 The discovery method and system of software vulnerability
CN106843933A (en) * 2016-12-27 2017-06-13 北京五八信息技术有限公司 A kind of leak restorative procedure of application program, mobile terminal and patch server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542498A (en) * 2018-11-27 2019-03-29 郑州云海信息技术有限公司 A kind of method and apparatus for administrative vulnerability
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium
CN114996718A (en) * 2022-06-30 2022-09-02 浙江网商银行股份有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
Zahan et al. What are weak links in the npm supply chain?
JP6676480B2 (en) Vulnerability risk assessment system
US8230497B2 (en) Method of identifying software vulnerabilities on a computer system
CN102833258B (en) Network address access method and system
EP3178011B1 (en) Method and system for facilitating terminal identifiers
TW201931187A (en) URL attack detection method and apparatus, and electronic device
US20130160126A1 (en) Malware remediation system and method for modern applications
US20090113548A1 (en) Executable Download Tracking System
CN104769598B (en) System and method for detecting unauthorized applications
CN109376534B (en) Method and apparatus for detecting applications
CN104580133A (en) Malicious program protection method and system and filtering table updating method thereof
CN108154033A (en) A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information
CN110895472A (en) Method and device for identifying service change
RU2701040C1 (en) Method and a computer for informing on malicious web resources
CN107239701A (en) Recognize the method and device of malicious websites
CN108052824A (en) A kind of risk prevention system method, apparatus and electronic equipment
US10320816B1 (en) Systems and methods for uniquely identifying malicious advertisements
EP3671512B1 (en) Automated software vulnerability determination
JP6623128B2 (en) Log analysis system, log analysis method, and log analysis device
TWI703846B (en) URL abnormal location method, device, server and storage medium
CN115495740A (en) Virus detection method and device
JP2009053896A (en) Unauthorized operation detector and program
CN113934625A (en) Software detection method, device and storage medium
CN113344598A (en) Data verification method, device, medium and electronic equipment
US11785028B1 (en) Dynamic analysis for detecting harmful content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180612