![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2017.0164 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2017-0164) |
Resumen: | The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. Vulnerability Insight: It was found that apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key (CVE-2016-8614). It is reported that in Ansible, under some circumstances the mysql_user module may fail to correctly change a password. Thus an old password may still be active when it should have been changed (CVE-2016-8647). Data for lookup plugins used as variables was not being correctly marked as 'unsafe' (CVE-2017-7481). The ansible package has been updated to version 2.3.1 to fix these issues and several other bugs. Affected Software/OS: 'ansible' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-8614 BugTraq ID: 94108 http://www.securityfocus.com/bid/94108 Common Vulnerability Exposure (CVE) ID: CVE-2016-8647 RHSA-2017:1685 https://access.redhat.com/errata/RHSA-2017:1685 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647 https://github.com/ansible/ansible-modules-core/pull/5388 Common Vulnerability Exposure (CVE) ID: CVE-2017-7481 BugTraq ID: 98492 http://www.securityfocus.com/bid/98492 https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html RedHat Security Advisories: RHSA-2017:1244 https://access.redhat.com/errata/RHSA-2017:1244 RedHat Security Advisories: RHSA-2017:1334 https://access.redhat.com/errata/RHSA-2017:1334 RedHat Security Advisories: RHSA-2017:1476 https://access.redhat.com/errata/RHSA-2017:1476 RedHat Security Advisories: RHSA-2017:1499 https://access.redhat.com/errata/RHSA-2017:1499 RedHat Security Advisories: RHSA-2017:1599 https://access.redhat.com/errata/RHSA-2017:1599 RedHat Security Advisories: RHSA-2017:2524 https://access.redhat.com/errata/RHSA-2017:2524 https://usn.ubuntu.com/4072-1/ |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |