Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871696
Categoría:Red Hat Local Security Checks
Título:RedHat Update for openssh RHSA-2016:2588-02
Resumen:The remote host is missing an update for the 'openssh'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'openssh'
package(s) announced via the referenced advisory.

Vulnerability Insight:
OpenSSH is an SSH protocol implementation
supported by a number of Linux, UNIX, and similar operating systems. It includes
the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* It was discovered that the OpenSSH sshd daemon fetched PAM environment
settings before running the login program. In configurations with
UseLogin=yes and the pam_env PAM module configured to read user environment
settings, a local user could use this flaw to execute arbitrary code as
root. (CVE-2015-8325)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
openssh on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-8325
BugTraq ID: 86187
http://www.securityfocus.com/bid/86187
Debian Security Information: DSA-3550 (Google Search)
http://www.debian.org/security/2016/dsa-3550
https://security.gentoo.org/glsa/201612-18
RedHat Security Advisories: RHSA-2016:2588
http://rhn.redhat.com/errata/RHSA-2016-2588.html
RedHat Security Advisories: RHSA-2017:0641
http://rhn.redhat.com/errata/RHSA-2017-0641.html
http://www.securitytracker.com/id/1036487
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.