Amazon Linux 2:pcp (ALAS-2020-1561)

high Nessus Plugin ID 142734

概要

遠端 Amazon Linux 2 主機缺少安全性更新。

說明

遠端主機上安裝的測試產品版本比測試版本舊。因此,會受到 ALAS2-2020-1561 公告中所提及的多個弱點影響。

- SUSE Linux Enterprise High Performance Computing 15-ESPOS、SUSE Linux Enterprise High Performance Computing 15-LTSS、SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12- SP5 的 pcp 封裝中存在對程式碼的產生控制不當的弱點。openSUSE Leap 15.1 透過將程式碼放進 /var/log/pcp/configs.sh 中,允許使用者 pcp 以 root 身分執行程式碼。此問題會影響:SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。
SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。
(CVE-2019-3695)

- SUSE Linux Enterprise High Performance Computing 15-ESPOS、SUSE Linux Enterprise High Performance Computing 15-LTSS、SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12- SP5 的 pcp 封裝中存在對受限目錄的路徑名稱限制不當的弱點。openSUSE Leap 15.1 允許使用者 pcp 覆寫具有任意內容的任意檔案。此問題會影響:SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。(CVE-2019-3696)

請注意,Nessus 並未測試此問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

執行「yum update pcp」以更新系統。

另請參閱

https://alas.aws.amazon.com/AL2/ALAS-2020-1561.html

https://access.redhat.com/security/cve/CVE-2019-3695

https://access.redhat.com/security/cve/CVE-2019-3696

Plugin 詳細資訊

嚴重性: High

ID: 142734

檔案名稱: al2_ALAS-2020-1561.nasl

版本: 1.3

類型: local

代理程式: unix

已發布: 2020/11/11

已更新: 2024/2/9

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: High

基本分數: 7.2

時間分數: 5.6

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2019-3695

CVSS v3

風險因素: High

基本分數: 7.8

時間分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:amazon:linux:pcp-pmda-cifs, p-cpe:/a:amazon:linux:pcp-pmda-lmsensors, p-cpe:/a:amazon:linux:pcp-pmda-mysql, p-cpe:/a:amazon:linux:pcp-pmda-postgresql, p-cpe:/a:amazon:linux:pcp-pmda-sendmail, p-cpe:/a:amazon:linux:pcp-pmda-smart, p-cpe:/a:amazon:linux:pcp-conf, p-cpe:/a:amazon:linux:pcp-import-mrtg2pcp, p-cpe:/a:amazon:linux:pcp-manager, p-cpe:/a:amazon:linux:pcp-pmda-activemq, p-cpe:/a:amazon:linux:pcp-pmda-lustrecomm, p-cpe:/a:amazon:linux:pcp-pmda-mic, p-cpe:/a:amazon:linux:pcp-pmda-mounts, p-cpe:/a:amazon:linux:pcp-pmda-nfsclient, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:pcp-import-sar2pcp, p-cpe:/a:amazon:linux:pcp-pmda-prometheus, p-cpe:/a:amazon:linux:pcp-pmda-weblog, p-cpe:/a:amazon:linux:pcp-pmda-zimbra, p-cpe:/a:amazon:linux:pcp-webapp-blinkenlights, p-cpe:/a:amazon:linux:pcp-import-ganglia2pcp, p-cpe:/a:amazon:linux:pcp-libs, p-cpe:/a:amazon:linux:pcp-pmda-redis, p-cpe:/a:amazon:linux:pcp-pmda-unbound, p-cpe:/a:amazon:linux:pcp-pmda-zswap, p-cpe:/a:amazon:linux:pcp-system-tools, p-cpe:/a:amazon:linux:pcp-pmda-lustre, p-cpe:/a:amazon:linux:pcp-webapi, p-cpe:/a:amazon:linux:perl-pcp-logimport, p-cpe:/a:amazon:linux:pcp-pmda-gfs2, p-cpe:/a:amazon:linux:pcp-pmda-gpsd, p-cpe:/a:amazon:linux:pcp-pmda-infiniband, p-cpe:/a:amazon:linux:pcp-pmda-named, p-cpe:/a:amazon:linux:pcp-pmda-vmware, p-cpe:/a:amazon:linux:pcp-export-pcp2graphite, p-cpe:/a:amazon:linux:pcp-export-pcp2zabbix, p-cpe:/a:amazon:linux:pcp-export-zabbix-agent, p-cpe:/a:amazon:linux:pcp-pmda-ds389log, p-cpe:/a:amazon:linux:pcp-pmda-libvirt, p-cpe:/a:amazon:linux:pcp-pmda-perfevent, p-cpe:/a:amazon:linux:perl-pcp-logsummary, p-cpe:/a:amazon:linux:perl-pcp-pmda, p-cpe:/a:amazon:linux:pcp-pmda-bash, p-cpe:/a:amazon:linux:pcp-pmda-news, p-cpe:/a:amazon:linux:pcp-pmda-summary, p-cpe:/a:amazon:linux:pcp-webapp-graphite, p-cpe:/a:amazon:linux:pcp-zeroconf, p-cpe:/a:amazon:linux:python-pcp, p-cpe:/a:amazon:linux:pcp-export-pcp2elasticsearch, p-cpe:/a:amazon:linux:pcp-pmda-pdns, p-cpe:/a:amazon:linux:pcp-export-pcp2influxdb, p-cpe:/a:amazon:linux:pcp-export-pcp2spark, p-cpe:/a:amazon:linux:pcp-gui, p-cpe:/a:amazon:linux:pcp-libs-devel, p-cpe:/a:amazon:linux:pcp-pmda-apache, p-cpe:/a:amazon:linux:pcp-pmda-ds389, p-cpe:/a:amazon:linux:pcp-pmda-memcache, p-cpe:/a:amazon:linux:pcp-pmda-roomtemp, p-cpe:/a:amazon:linux:pcp-pmda-rsyslog, p-cpe:/a:amazon:linux:pcp-selinux, p-cpe:/a:amazon:linux:pcp-testsuite, p-cpe:/a:amazon:linux:pcp-import-collectl2pcp, p-cpe:/a:amazon:linux:pcp-webapp-vector, p-cpe:/a:amazon:linux:pcp-devel, p-cpe:/a:amazon:linux:pcp-import-iostat2pcp, p-cpe:/a:amazon:linux:pcp-pmda-docker, p-cpe:/a:amazon:linux:pcp-pmda-netfilter, p-cpe:/a:amazon:linux:pcp-pmda-oracle, p-cpe:/a:amazon:linux:pcp-pmda-rpm, p-cpe:/a:amazon:linux:pcp-webjs, p-cpe:/a:amazon:linux:pcp-export-pcp2json, p-cpe:/a:amazon:linux:pcp-debuginfo, p-cpe:/a:amazon:linux:pcp-pmda-gluster, p-cpe:/a:amazon:linux:pcp-pmda-haproxy, p-cpe:/a:amazon:linux:pcp-pmda-json, p-cpe:/a:amazon:linux:pcp-pmda-nginx, p-cpe:/a:amazon:linux:pcp-pmda-snmp, p-cpe:/a:amazon:linux:pcp-pmda-systemd, p-cpe:/a:amazon:linux:pcp-pmda-gpfs, p-cpe:/a:amazon:linux:pcp-pmda-lio, p-cpe:/a:amazon:linux:pcp-pmda-trace, p-cpe:/a:amazon:linux:pcp-webapp-grafana, p-cpe:/a:amazon:linux:perl-pcp-mmv, p-cpe:/a:amazon:linux:pcp-export-pcp2xml, p-cpe:/a:amazon:linux:pcp-pmda-dm, p-cpe:/a:amazon:linux:pcp-pmda-elasticsearch, p-cpe:/a:amazon:linux:pcp-pmda-mailq, p-cpe:/a:amazon:linux:pcp-pmda-nvidia-gpu, p-cpe:/a:amazon:linux:pcp-pmda-postfix, p-cpe:/a:amazon:linux:pcp-pmda-slurm, p-cpe:/a:amazon:linux:pcp, p-cpe:/a:amazon:linux:pcp-doc, p-cpe:/a:amazon:linux:pcp-pmda-bind2, p-cpe:/a:amazon:linux:pcp-pmda-bonding, p-cpe:/a:amazon:linux:pcp-pmda-cisco, p-cpe:/a:amazon:linux:pcp-pmda-dbping, p-cpe:/a:amazon:linux:pcp-pmda-logger, p-cpe:/a:amazon:linux:pcp-pmda-samba, p-cpe:/a:amazon:linux:pcp-pmda-shping

必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/11/9

弱點發布日期: 2020/3/3

參考資訊

CVE: CVE-2019-3695, CVE-2019-3696

ALAS: 2020-1561