Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2020.0216
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2020-0216)
Summary:The remote host is missing an update for the 'nmap' package(s) announced via the MGASA-2020-0216 advisory.
Description:Summary:
The remote host is missing an update for the 'nmap' package(s) announced via the MGASA-2020-0216 advisory.

Vulnerability Insight:
Updated nmap packages fix security vulnerability:

nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition
due to a double free when an SSH connection fails, as demonstrated by a
leading \n character to ssh-brute.nse or ssh-auth-methods.nse
(CVE-2017-18594).

Also, when a server forced a protocol and did not return TLS ALPN extension,
this caused an infinite loop.

Affected Software/OS:
'nmap' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-18594
https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
https://github.com/nmap/nmap/issues/1077
https://github.com/nmap/nmap/issues/1227
https://seclists.org/nmap-announce/2019/0
https://seclists.org/nmap-dev/2018/q2/45
SuSE Security Announcement: openSUSE-SU-2019:2198 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html
SuSE Security Announcement: openSUSE-SU-2019:2200 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.