![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.120035 |
Category: | Amazon Linux Local Security Checks |
Title: | Amazon Linux: Security Advisory (ALAS-2015-552) |
Summary: | The remote host is missing an update for the 'python27' package(s) announced via the ALAS-2015-552 advisory. |
Description: | Summary: The remote host is missing an update for the 'python27' package(s) announced via the ALAS-2015-552 advisory. Vulnerability Insight: It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory.(CVE-2013-1752) It was discovered that the Python xmlrpclib did not restrict the size of a gzip compressed HTTP responses. A malicious XMLRPC server could cause an XMLRPC client using xmlrpclib to consume an excessive amount of memory. (CVE-2013-1753) The Python standard library HTTP client modules (such as httplib or urllib) did not perform verification of TLS/SSL certificates when connecting to HTTPS servers. A man-in-the-middle attacker could use this flaw to hijack connections and eavesdrop or modify transferred data.(CVE-2014-9365) Affected Software/OS: 'python27' package(s) on Amazon Linux. Solution: Please install the updated package(s). CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1752 Common Vulnerability Exposure (CVE) ID: CVE-2013-1753 Common Vulnerability Exposure (CVE) ID: CVE-2014-9365 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html BugTraq ID: 71639 http://www.securityfocus.com/bid/71639 https://security.gentoo.org/glsa/201503-10 http://www.openwall.com/lists/oss-security/2014/12/11/1 RedHat Security Advisories: RHSA-2016:1166 https://access.redhat.com/errata/RHSA-2016:1166 RedHat Security Advisories: RHSA-2017:1162 https://access.redhat.com/errata/RHSA-2017:1162 RedHat Security Advisories: RHSA-2017:1868 https://access.redhat.com/errata/RHSA-2017:1868 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |