RHEL 6:JBoss Core Services (RHSA-2019:3932) (0 長度標頭洩漏) (Data Dribble) (內部資料緩衝) (資源迴圈)

high Nessus Plugin ID 131215

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

現已提供適用於 Red Hat Enterprise Linux 6 的更新版套件,內含 Red Hat JBoss Core Services Pack Apache Server 2.4.37,修正數個錯誤,並新增數項增強功能。Red Hat 產品安全性團隊已將此更新評等為具有重要安全性影響。可從〈參照〉一節的 CVE 連結中取得每個弱點之常見弱點評分系統 (CVSS) 的基本分數,其中包含有關嚴重性評等的詳細資訊。此版本新增了 Apache HTTP Server 2.4.37 套件,其為 JBoss Core Services 供應項目的一部分。此版本作為 Red Hat JBoss Core Services Pack Apache Server 2.4.29 的取代版本,並含有數個錯誤修正和增強功能。如需此版本中最重要的錯誤修正及增強功能的詳細資訊,請參閱「版本資訊」。安全性修正:* openssl:crypto/rsa/ rsa_gen.c 中發生 RSA 金鑰產生快取計時弱點,進而讓攻擊者復原私密金鑰 (CVE-2018-0737) * openssl:DSA 簽章演算法中發生計時旁路攻擊 (CVE-2018-0734) * mod_auth_digest:因為爭用情形造成存取控制繞過弱點 (CVE-2019-0217) * openssl:SMT/Hyper-Threading 架構上的旁路弱點 (PortSmash) (CVE-2018-5407) * mod_session_cookie 並未奉行到期時間 (CVE-2018-17199) * mod_http2:透過緩慢、不需要的要求內文造成 DoS (CVE-2018-17189) * mod_http2:執行最新更新可能會發生當機 (CVE-2019-0197) * mod_http2:執行字串比較時發生釋放後讀取 (CVE-2019-0196) * nghttp2:HTTP/2:大量資料要求導致拒絕服務 (CVE-2019-9511) * nghttp2:HTTP/2:使用 PRIORITY 框架的洪水導致資源過度消耗 (CVE-2019-9513) * mod_http2:HTTP/2:0 長度標頭導致拒絕服務 (CVE-2019-9516) * mod_http2:HTTP/2:對大型回應的要求導致拒絕服務 (CVE-2019-9517) 如需安全性問題的詳細資料,包括影響、CVSS 分數、致謝及其他相關資訊,請參閱〈參照〉一節列出的 CVE 頁面。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/errata/RHSA-2019:3932

https://access.redhat.com/security/cve/cve-2018-0734

https://access.redhat.com/security/cve/cve-2018-0737

https://access.redhat.com/security/cve/cve-2018-5407

https://access.redhat.com/security/cve/cve-2018-17189

https://access.redhat.com/security/cve/cve-2018-17199

https://access.redhat.com/security/cve/cve-2019-0196

https://access.redhat.com/security/cve/cve-2019-0197

https://access.redhat.com/security/cve/cve-2019-0217

https://access.redhat.com/security/cve/cve-2019-9511

https://access.redhat.com/security/cve/cve-2019-9513

https://access.redhat.com/security/cve/cve-2019-9516

https://access.redhat.com/security/cve/cve-2019-9517

Plugin 詳細資訊

嚴重性: High

ID: 131215

檔案名稱: redhat-RHSA-2019-3932.nasl

版本: 1.3

類型: local

代理程式: unix

已發布: 2019/11/22

已更新: 2022/12/5

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6

時間分數: 4.7

媒介: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS 評分資料來源: CVE-2019-0217

CVSS v3

風險因素: High

基本分數: 7.5

時間分數: 6.7

媒介: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-libs, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-perl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-static, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-mysql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-nss, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-odbc, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-openssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-pgsql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-sqlite, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-brotli, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-brotli-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-brotli-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-curl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-curl-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-manual, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-selinux, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-tools, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-jansson, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-jansson-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-jansson-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_cluster-native, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_cluster-native-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-ap24, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-manual, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_md, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_proxy_html, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_security, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_security-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_session, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2-debuginfo, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2019/11/20

弱點發布日期: 2018/4/16

參考資訊

CVE: CVE-2018-0734, CVE-2018-0737, CVE-2018-17189, CVE-2018-17199, CVE-2018-5407, CVE-2019-0196, CVE-2019-0197, CVE-2019-0217, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, CVE-2019-9517

RHSA: 2019:3932