![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.882991 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for keepalived CESA-2019:0022 centos7 |
Resumen: | The remote host is missing an update for the 'keepalived'; package(s) announced via the CESA-2019:0022 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'keepalived' package(s) announced via the CESA-2019:0022 advisory. Vulnerability Insight: The keepalived utility provides simple and robust facilities for load balancing and high availability. The load balancing framework relies on the well-known and widely used IP Virtual Server (IPVS) kernel module providing layer-4 (transport layer) load balancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage a load balanced server pool according to the health of the servers. Keepalived also implements the Virtual Router Redundancy Protocol (VRRPv2) to achieve high availability with director failover. Security Fix(es): * keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution (CVE-2018-19115) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Affected Software/OS: keepalived on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-19115 https://security.gentoo.org/glsa/201903-01 https://bugzilla.suse.com/show_bug.cgi?id=1015141 https://github.com/acassen/keepalived/pull/961 https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9 https://lists.debian.org/debian-lts-announce/2018/11/msg00034.html RedHat Security Advisories: RHSA-2019:0022 https://access.redhat.com/errata/RHSA-2019:0022 RedHat Security Advisories: RHSA-2019:1792 https://access.redhat.com/errata/RHSA-2019:1792 RedHat Security Advisories: RHSA-2019:1945 https://access.redhat.com/errata/RHSA-2019:1945 https://usn.ubuntu.com/3995-1/ https://usn.ubuntu.com/3995-2/ |
Copyright | Copyright (C) 2019 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |