RHEL 7/8:Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 (RHSA-2022: 1389)

critical Nessus Plugin ID 160030

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 7/8 主機上安裝的多個套件受到 RHSA-2022: 1389 公告中提及的一個弱點影響。

- libxml2:entities.c 的 xmlEncodeEntitiesInternal() 中存在釋放後使用問題 (CVE-2021-3516)

- libxml2:entities.c 的 xmlEncodeEntitiesInternal() 中存在堆積型緩衝區溢位弱點 (CVE-2021-3517)

- libxml2:xinclude.c 的 xmlXIncludeDoProcess() 中存在釋放後使用問題 (CVE-2021-3518)

- libxml2:在復原模式下剖析 POST 驗證混合內容時,發生 NULL 指標解除參照 (CVE-2021-3537)

- libxml2:指數實體擴展攻擊會繞過所有現有的保護機制 (CVE-2021-3541)

- openssl:剖析憑證時,可連線到 BN_mod_sqrt() 中的無限迴圈 (CVE-2022-0778)

- httpd:在捨棄要求內文期間遇到的錯誤會導致 HTTP 要求走私 (CVE-2022-22720)

- libxml2:ID 和 IDREF 屬性釋放後使用弱點 (CVE-2022-23308)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/security/cve/CVE-2021-3516

https://access.redhat.com/security/cve/CVE-2021-3517

https://access.redhat.com/security/cve/CVE-2021-3518

https://access.redhat.com/security/cve/CVE-2021-3537

https://access.redhat.com/security/cve/CVE-2021-3541

https://access.redhat.com/security/cve/CVE-2022-0778

https://access.redhat.com/security/cve/CVE-2022-22720

https://access.redhat.com/security/cve/CVE-2022-23308

https://access.redhat.com/errata/RHSA-2022:1389

https://bugzilla.redhat.com/1950515

https://bugzilla.redhat.com/1954225

https://bugzilla.redhat.com/1954232

https://bugzilla.redhat.com/1954242

https://bugzilla.redhat.com/1956522

https://bugzilla.redhat.com/2056913

https://bugzilla.redhat.com/2062202

https://bugzilla.redhat.com/2064321

Plugin 詳細資訊

嚴重性: Critical

ID: 160030

檔案名稱: redhat-RHSA-2022-1389.nasl

版本: 1.11

類型: local

代理程式: unix

已發布: 2022/4/21

已更新: 2023/11/1

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: High

基本分數: 7.5

時間分數: 6.2

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 評分資料來源: CVE-2022-22720

CVSS v3

風險因素: Critical

基本分數: 9.8

時間分數: 9.1

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:F/RL:O/RC:C

弱點資訊

CPE: cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-mysql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-nss, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-odbc, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-openssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-pgsql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-sqlite, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-curl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-manual, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-selinux, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-tools, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_cluster-native, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_http2, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-ap24, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-manual, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_md, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_proxy_html, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_security, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_session, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-chil, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-libs, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-perl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-pkcs11, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-static

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2022/4/20

弱點發布日期: 2021/5/14

參考資訊

CVE: CVE-2021-3516, CVE-2021-3517, CVE-2021-3518, CVE-2021-3537, CVE-2021-3541, CVE-2022-0778, CVE-2022-22720, CVE-2022-23308

CWE: 400, 416, 444, 476, 787, 835

IAVA: 2021-A-0482, 2021-A-0487-S, 2022-A-0038, 2022-A-0121-S, 2022-A-0124-S

RHSA: 2022:1389