Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.120368 |
Kategorie: | Amazon Linux Local Security Checks |
Titel: | Amazon Linux: Security Advisory (ALAS-2015-501) |
Zusammenfassung: | The remote host is missing an update announced via the referenced Security Advisory. |
Beschreibung: | Summary: The remote host is missing an update announced via the referenced Security Advisory. Vulnerability Insight: An information disclosure flaw was found in the way the 389 Directory Server stored information in the Changelog that is exposed via the 'cn=changelog' LDAP sub-tree. An unauthenticated user could in certain cases use this flaw to read data from the Changelog, which could include sensitive information such as plain-text passwords. (CVE-2014-8105 )It was found that when the nsslapd-unhashed-pw-switch 389 Directory Server configuration option was set to off, it did not prevent the writing of unhashed passwords into the Changelog. This could potentially allow an authenticated user able to access the Changelog to read sensitive information. (CVE-2014-8112 ) Solution: Run yum update 389-ds-base to update your system. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-8112 http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153991.html RedHat Security Advisories: RHSA-2015:0416 http://rhn.redhat.com/errata/RHSA-2015-0416.html Common Vulnerability Exposure (CVE) ID: CVE-2014-8105 RedHat Security Advisories: RHSA-2015:0628 http://rhn.redhat.com/errata/RHSA-2015-0628.html |
Copyright | Copyright (C) 2015 Eero Volotinen |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |