![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.120551 |
Categoría: | Amazon Linux Local Security Checks |
Título: | Amazon Linux: Security Advisory (ALAS-2013-256) |
Resumen: | The remote host is missing an update for the 'openmpi' package(s) announced via the ALAS-2013-256 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'openmpi' package(s) announced via the ALAS-2013-256 advisory. Vulnerability Insight: A flaw was found in the way ibutils handled temporary files. A local attacker could use this flaw to cause arbitrary files to be overwritten as the root user via a symbolic link attack. It was discovered that librdmacm used a static port to connect to the ib_acm service. A local attacker able to run a specially crafted ib_acm service on that port could use this flaw to provide incorrect address resolution information to librmdacm applications. Affected Software/OS: 'openmpi' package(s) on Amazon Linux. Solution: Please install the updated package(s). CVSS Score: 6.3 CVSS Vector: AV:L/AC:M/Au:N/C:N/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4516 55896 http://www.securityfocus.com/bid/55896 [oss-security] 20121011 CVE Request -- librdmacm (one issue) / ibacm (two issues) http://www.openwall.com/lists/oss-security/2012/10/11/6 [oss-security] 20121011 Re: CVE Request -- librdmacm (one issue) / ibacm (two issues) http://www.openwall.com/lists/oss-security/2012/10/11/9 http://git.openfabrics.org/git?p=~shefty/librdmacm.git%3Ba=commitdiff%3Bh=4b5c1aa734e0e734fc2ba3cd41d0ddf02170af6d https://bugzilla.redhat.com/show_bug.cgi?id=865483 Common Vulnerability Exposure (CVE) ID: CVE-2013-2561 BugTraq ID: 58335 http://www.securityfocus.com/bid/58335 http://seclists.org/fulldisclosure/2013/Mar/87 http://www.openwall.com/lists/oss-security/2013/03/26/1 http://www.openwall.com/lists/oss-security/2013/03/26/11 http://www.openwall.com/lists/oss-security/2013/03/26/4 http://www.openwall.com/lists/oss-security/2013/03/19/8 RedHat Security Advisories: RHSA-2013:1661 http://rhn.redhat.com/errata/RHSA-2013-1661.html |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |