![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.122789 |
Categoría: | Oracle Linux Local Security Checks |
Título: | Oracle: Security Advisory (ELSA-2015-2505) |
Resumen: | The remote host is missing an update for the 'abrt, libreport' package(s) announced via the ELSA-2015-2505 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'abrt, libreport' package(s) announced via the ELSA-2015-2505 advisory. Vulnerability Insight: abrt [2.1.11-35.0.1] - Drop libreport-rhel and libreport-plugin-rhtsupport requires [2.1.11-35] - make /var/spool/abrt owned by root - remove 'r' from /var/spool/abrt for other users - abrt-action-install-debug-info: use secure temporary directory - stop saving abrt's core files to /var/spool/abrt if DebugLevel < 1 - Fixes for: CVE-2015-5273 and CVE-2015-5287 - Resolves: #1266853 libreport [2.1.11-31.0.1] - Update workflow xml for Oracle [18945470] - Add oracle-enterprise.patch and oracle-enterprise-po.patch - Remove libreport-plugin-rhtsupport and libreport-rhel - Added orabug20390725.patch to remove redhat reference [bug 20390725] - Added Bug20357383.patch to remove redhat reference [bug 20357383] [2.1.11-31] - save all files changed by the reporter in the reporting GUI - Fixes CVE-2015-5302 - Related: #1266853 Affected Software/OS: 'abrt, libreport' package(s) on Oracle Linux 7. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5273 78113 http://www.securityfocus.com/bid/78113 FEDORA-2015-79c1758468 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172809.html RHSA-2015:2505 http://rhn.redhat.com/errata/RHSA-2015-2505.html [oss-security] 20151201 CVE-2015-5273 + CVE-2015-5287, abrt local root in Centos/Fedora/RHEL http://www.openwall.com/lists/oss-security/2015/12/01/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html https://bugzilla.redhat.com/show_bug.cgi?id=1262252 https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e Common Vulnerability Exposure (CVE) ID: CVE-2015-5287 38832 https://www.exploit-db.com/exploits/38832/ 78137 http://www.securityfocus.com/bid/78137 http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html https://bugzilla.redhat.com/show_bug.cgi?id=1266837 https://github.com/abrt/abrt/commit/3c1b60cfa62d39e5fff5a53a5bc53dae189e740e Common Vulnerability Exposure (CVE) ID: CVE-2015-5302 77685 http://www.securityfocus.com/bid/77685 FEDORA-2015-6542ab6d3a http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172695.html RHSA-2015:2504 http://rhn.redhat.com/errata/RHSA-2015-2504.html https://bugzilla.redhat.com/show_bug.cgi?id=1270903 https://github.com/abrt/libreport/commit/257578a23d1537a2d235aaa2b1488ee4f818e360 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |