![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.880676 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for nfs-utils CESA-2009:1321 centos5 i386 |
Resumen: | The remote host is missing an update for the 'nfs-utils'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'nfs-utils' package(s) announced via the referenced advisory. Vulnerability Insight: The nfs-utils package provides a daemon for the kernel NFS server and related tools. It was discovered that nfs-utils did not use tcp_wrappers correctly. Certain hosts access rules defined in '/etc/hosts.allow' and '/etc/hosts.deny' may not have been honored, possibly allowing remote attackers to bypass intended access restrictions. (CVE-2008-4552) This updated package also fixes the following bugs: * the 'LOCKD_TCPPORT' and 'LOCKD_UDPPORT' options in '/etc/sysconfig/nfs' were not honored: the lockd daemon continued to use random ports. With this update, these options are honored. (BZ#434795) * it was not possible to mount NFS file systems from a system that has the '/etc/' directory mounted on a read-only file system (this could occur on systems with an NFS-mounted root file system). With this update, it is possible to mount NFS file systems from a system that has '/etc/' mounted on a read-only file system. (BZ#450646) * arguments specified by 'STATDARG=' in '/etc/sysconfig/nfs' were removed by the nfslock init script, meaning the arguments specified were never passed to rpc.statd. With this update, the nfslock init script no longer removes these arguments. (BZ#459591) * when mounting an NFS file system from a host not specified in the NFS server's '/etc/exports' file, a misleading 'unknown host' error was logged on the server (the hostname lookup did not fail). With this update, a clearer error message is provided for these situations. (BZ#463578) * the nhfsstone benchmark utility did not work with NFS version 3 and 4. This update adds support to nhfsstone for NFS version 3 and 4. The new nhfsstone '-2', '-3', and '-4' options are used to select an NFS version (similar to nfsstat(8)). (BZ#465933) * the exportfs(8) manual page contained a spelling mistake, 'djando', in the EXAMPLES section. (BZ#474848) * in some situations the NFS server incorrectly refused mounts to hosts that had a host alias in a NIS netgroup. (BZ#478952) * in some situations the NFS client used its cache, rather than using the latest version of a file or directory from a given export. This update adds a new mount option, 'lookupcache=', which allows the NFS client to control how it caches files and directories. Note: The Red Hat Enterprise Linux 5.4 kernel update (the fourth regular update) must be installed in order to use the 'lookupcache=' option. Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: nfs-utils on CentOS 5 Solution: Please install the updated packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-4552 20081030 rPSA-2008-0307-1 nfs-client nfs-server nfs-utils http://www.securityfocus.com/archive/1/497935/100/0/threaded 31823 http://www.securityfocus.com/bid/31823 32346 http://secunia.com/advisories/32346 32481 http://secunia.com/advisories/32481 33006 http://secunia.com/advisories/33006 36538 http://secunia.com/advisories/36538 38794 http://secunia.com/advisories/38794 38833 http://secunia.com/advisories/38833 ADV-2010-0528 http://www.vupen.com/english/advisories/2010/0528 MDVSA-2009:060 http://www.mandriva.com/security/advisories?name=MDVSA-2009:060 RHSA-2009:1321 http://www.redhat.com/support/errata/RHSA-2009-1321.html USN-687-1 http://www.ubuntu.com/usn/USN-687-1 [oss-security] 20120719 CVE Request: quota: incorrect use of tcp_wrappers http://www.openwall.com/lists/oss-security/2012/07/19/2 [oss-security] 20120719 Re: CVE Request: quota: incorrect use of tcp_wrappers http://www.openwall.com/lists/oss-security/2012/07/19/5 [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates http://lists.vmware.com/pipermail/security-announce/2010/000082.html http://wiki.rpath.com/Advisories:rPSA-2008-0307 https://bugzilla.redhat.com/show_bug.cgi?id=458676 nfsutils-hostctl-security-bypass(45895) https://exchange.xforce.ibmcloud.com/vulnerabilities/45895 oval:org.mitre.oval:def:11544 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11544 oval:org.mitre.oval:def:8325 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8325 |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |