This article is only for the Green League vulnerability scan results, in RHEL / CentOS / OEL5.x x64-bit versions exist as high-risk vulnerabilities, where finishing solutions, again through vulnerability scanning, vulnerability has been patched.
High-risk
OpenSSH ‘schnorr.c’ remote memory corruption vulnerability (CVE-2014-1692)
OpenSSH J-PAKE licensing issues Vulnerability (CVE-2010-4478)
OpenSSH GSSAPI remote code execution vulnerability (CVE-2006-5051)
GNU Bash environment variable remote Command Execution Vulnerability (CVE-2014-6271)
GNU Wget symlink vulnerability (CVE-2014-4877)
The risk
OpenSSH default server configuration Denial of Service Vulnerability (CVE-2010-5107)
OpenSSH glob expression Denial of Service Vulnerability (CVE-2010-4755)
OpenSSH Licenses and Access Control Vulnerability (CVE-2014-2532)
OpenSSH verify_host_key function SSHFP DNS RR Check Bypass Vulnerability (CVE-2014-2653)
OpenSSH S / Key Remote Information Disclosure Vulnerability (CVE-2007-2243)
1. RHEL /CentOS/OEL5/6.x x64-bit versions of the operating system vulnerabilities Galway to upgrade openssh 6.6p1, would eliminate the loopholes in the following school risk, low-risk vulnerabilities can ignored.
(1) using the original source package installation
(2) using rpm installation package upgrade installation, this uses rpm package upgrade patch.
Recent Comments