RHEL 6/8:AMQ 用戶端 2.6.0 版本 (重要) (RHSA-2020: 0601)

critical Nessus Plugin ID 170341

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 6/8 主機上安裝的套件受到 RHSA-2020: 0601 公告中提及的多個弱點影響。

- netty:HTTP 要求走私 (CVE-2019-20444)

- netty:HttpObjectDecoder.java 允許 Content-Length 標頭隨附第二個 Content-Length 標頭 (CVE-2019-20445)

- netty:因傳輸編碼空白處理不當而導致 HTTP 要求走私 (CVE-2020-7238)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

http://www.nessus.org/u?7d3b1b00

https://access.redhat.com/documentation/en-us/red_hat_amq/

https://access.redhat.com/security/updates/classification/#important

https://access.redhat.com/errata/RHSA-2020:0601

https://bugzilla.redhat.com/show_bug.cgi?id=1796225

https://bugzilla.redhat.com/show_bug.cgi?id=1798509

https://bugzilla.redhat.com/show_bug.cgi?id=1798524

https://issues.redhat.com/browse/ENTMQCL-1075

https://issues.redhat.com/browse/ENTMQCL-1076

https://issues.redhat.com/browse/ENTMQCL-1246

https://issues.redhat.com/browse/ENTMQCL-1287

https://issues.redhat.com/browse/ENTMQCL-1322

https://issues.redhat.com/browse/ENTMQCL-1361

https://issues.redhat.com/browse/ENTMQCL-1364

https://issues.redhat.com/browse/ENTMQCL-1578

https://issues.redhat.com/browse/ENTMQCL-1583

https://issues.redhat.com/browse/ENTMQCL-1635

https://issues.redhat.com/browse/ENTMQCL-1641

https://issues.redhat.com/browse/ENTMQCL-1679

https://issues.redhat.com/browse/ENTMQCL-1717

https://issues.redhat.com/browse/ENTMQCL-1726

https://issues.redhat.com/browse/ENTMQCL-1781

https://issues.redhat.com/browse/ENTMQCL-1818

https://issues.redhat.com/browse/ENTMQCL-1835

Plugin 詳細資訊

嚴重性: Critical

ID: 170341

檔案名稱: redhat-RHSA-2020-0601.nasl

版本: 1.2

類型: local

代理程式: unix

已發布: 2023/1/23

已更新: 2024/4/28

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.0

CVSS v2

風險因素: Medium

基本分數: 6.4

時間分數: 5

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS 評分資料來源: CVE-2019-20445

CVSS v3

風險因素: Critical

基本分數: 9.1

時間分數: 8.2

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:nodejs-rhea, p-cpe:/a:redhat:enterprise_linux:python-qpid-proton, p-cpe:/a:redhat:enterprise_linux:python-qpid-proton-docs, p-cpe:/a:redhat:enterprise_linux:python3-qpid-proton, p-cpe:/a:redhat:enterprise_linux:qpid-proton, p-cpe:/a:redhat:enterprise_linux:qpid-proton-c, p-cpe:/a:redhat:enterprise_linux:qpid-proton-c-devel, p-cpe:/a:redhat:enterprise_linux:qpid-proton-c-docs, p-cpe:/a:redhat:enterprise_linux:qpid-proton-cpp, p-cpe:/a:redhat:enterprise_linux:qpid-proton-cpp-devel, p-cpe:/a:redhat:enterprise_linux:qpid-proton-cpp-docs, p-cpe:/a:redhat:enterprise_linux:qpid-proton-tests, p-cpe:/a:redhat:enterprise_linux:rubygem-qpid_proton, p-cpe:/a:redhat:enterprise_linux:rubygem-qpid_proton-doc

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/2/25

弱點發布日期: 2020/1/27

參考資訊

CVE: CVE-2019-20444, CVE-2019-20445, CVE-2020-7238

CWE: 444

RHSA: 2020:0601