November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

Categories

November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

CentOS6.x risk vulnerabilities

This article is only for the Green League vulnerability scan results, in RHEL / CentOS / OEL5.x x64-bit versions exist as high-risk vulnerabilities, where finishing solutions, again through vulnerability scanning, vulnerability has been patched.
High-risk
OpenSSH ‘schnorr.c’ remote memory corruption vulnerability (CVE-2014-1692)
OpenSSH J-PAKE licensing issues Vulnerability (CVE-2010-4478)
OpenSSH GSSAPI remote code execution vulnerability (CVE-2006-5051)
GNU Bash environment variable remote Command Execution Vulnerability (CVE-2014-6271)
GNU Wget symlink vulnerability (CVE-2014-4877)
The risk
OpenSSH default server configuration Denial of Service Vulnerability (CVE-2010-5107)
OpenSSH glob expression Denial of Service Vulnerability (CVE-2010-4755)
OpenSSH Licenses and Access Control Vulnerability (CVE-2014-2532)
OpenSSH verify_host_key function SSHFP DNS RR Check Bypass Vulnerability (CVE-2014-2653)
OpenSSH S / Key Remote Information Disclosure Vulnerability (CVE-2007-2243)

1. RHEL /CentOS/OEL5/6.x x64-bit versions of the operating system vulnerabilities Galway to upgrade openssh 6.6p1, would eliminate the loopholes in the following school risk, low-risk vulnerabilities can ignored.
(1) using the original source package installation
(2) using rpm installation package upgrade installation, this uses rpm package upgrade patch.

 

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>