Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.871696
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for openssh RHSA-2016:2588-02
Zusammenfassung:The remote host is missing an update for the 'openssh'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'openssh'
package(s) announced via the referenced advisory.

Vulnerability Insight:
OpenSSH is an SSH protocol implementation
supported by a number of Linux, UNIX, and similar operating systems. It includes
the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* It was discovered that the OpenSSH sshd daemon fetched PAM environment
settings before running the login program. In configurations with
UseLogin=yes and the pam_env PAM module configured to read user environment
settings, a local user could use this flaw to execute arbitrary code as
root. (CVE-2015-8325)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
openssh on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-8325
BugTraq ID: 86187
http://www.securityfocus.com/bid/86187
Debian Security Information: DSA-3550 (Google Search)
http://www.debian.org/security/2016/dsa-3550
https://security.gentoo.org/glsa/201612-18
RedHat Security Advisories: RHSA-2016:2588
http://rhn.redhat.com/errata/RHSA-2016-2588.html
RedHat Security Advisories: RHSA-2017:0641
http://rhn.redhat.com/errata/RHSA-2017-0641.html
http://www.securitytracker.com/id/1036487
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.