![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2024.1793 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for shim (EulerOS-SA-2024-1793) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'shim' package(s) announced via the EulerOS-SA-2024-1793 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'shim' package(s) announced via the EulerOS-SA-2024-1793 advisory. Vulnerability Insight: A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.(CVE-2023-0464) Affected Software/OS: 'shim' package(s) on Huawei EulerOS V2.0SP11. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-0464 Debian Security Information: DSA-5417 (Google Search) https://www.debian.org/security/2023/dsa-5417 https://security.gentoo.org/glsa/202402-08 https://www.couchbase.com/alerts/ 1.0.2zh patch (premium) https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e 1.1.1u git commit https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b 3.0.9 git commit https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1 3.1.1 git commit https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545 OpenSSL Advisory https://www.openssl.org/news/secadv/20230322.txt https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |