Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for NetworkManager and libnl3 RHSA-2017:2299-01
Summary:The remote host is missing an update for the 'NetworkManager and libnl3'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'NetworkManager and libnl3'
package(s) announced via the referenced advisory.

Vulnerability Insight:
NetworkManager is a system network service
that manages network devices and connections, attempting to keep active network
connectivity when available. Its capabilities include managing Ethernet,
wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN
integration with a variety of different VPN services. The libnl3 packages
contain a convenience library that simplifies using the Linux kernel's Netlink
sockets interface for network manipulation. The following packages have been
upgraded to a later upstream version: NetworkManager (1.8.0),
network-manager-applet (1.8.0). (BZ#1413312, BZ#1414103, BZ#1441621) Security
Fix(es) in the libnl3 component: * An integer overflow leading to a heap-buffer
overflow was found in the libnl library. An attacker could use this flaw to
cause an application compiled with libnl to crash or possibly execute arbitrary
code in the context of the user running such an application. (CVE-2017-0553)
Additional Changes: For detailed information on changes in this release, see the
Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.

Affected Software/OS:
NetworkManager and libnl3 on Red Hat Enterprise Linux Server (v. 7)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-0553
BugTraq ID: 97340
RedHat Security Advisories: RHSA-2017:2299
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.