MiracleLinux 7pcp-4.3.2-12.el7 (AXSA:2020-703:06)

high Nessus Plugin ID 293890

概要

遠端 MiracleLinux 主機缺少一個或多個安全性更新。

說明

遠端 MiracleLinux 7 主機已安裝受到多個弱點影響的套件如 AXSA:2020-703:06 公告中所提及。

pcppcp 規格檔案 %post 區段中發生本機權限提升 (CVE-2019-3695) SUSE Linux Enterprise High Performance Computing 15-ESPOS、SUSE Linux Enterprise High Performance Computing 15-LTSS 的 pcp 封裝有不當控製程式碼產生弱點。 SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12-SP5 openSUSE Leap 15.1 允許使用者 pcp 透過將程式碼放置到 /var/log/pcp/configs.sh 中以 root 身分執行程式碼此問題影響 3.11.9-5.8.1之前的 SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。
SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。
pcp在 pcp spec 檔案中透過 migrate_tempdirs 發生本機權限提升 (CVE-2019-3696) 在 SUSE Linux Enterprise High Performance Computing 15-ESPOS、SUSE Linux Enterprise High Performance Computing 15- 的 pcp 封裝中存在一個不當限制受限目錄的路徑名稱弱點LTSS、SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12-SP5 openSUSE Leap 15.1 允許本機使用者 pcp 以任意內容覆寫任意檔案。此問題會影響 3.11.9-5.8.1之前的 SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。

Tenable 已直接從 MiracleLinux 安全性公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://tsn.miraclelinux.com/en/node/11884

Plugin 詳細資訊

嚴重性: High

ID: 293890

檔案名稱: miracle_linux_AXSA-2020-703.nasl

版本: 1.1

類型: local

已發布: 2026/1/20

已更新: 2026/1/20

支援的感應器: Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

Vendor

Vendor Severity: High

CVSS v2

風險因素: High

基本分數: 7.2

時間性分數: 5.6

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2019-3695

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:miracle:linux:pcp-pmda-zswap, p-cpe:/a:miracle:linux:pcp-pmda-summary, p-cpe:/a:miracle:linux:pcp-pmda-activemq, p-cpe:/a:miracle:linux:python-pcp, p-cpe:/a:miracle:linux:pcp-pmda-unbound, p-cpe:/a:miracle:linux:pcp-pmda-gluster, p-cpe:/a:miracle:linux:pcp-pmda-roomtemp, p-cpe:/a:miracle:linux:pcp-pmda-dbping, p-cpe:/a:miracle:linux:pcp-system-tools, p-cpe:/a:miracle:linux:pcp-pmda-cisco, p-cpe:/a:miracle:linux:pcp, p-cpe:/a:miracle:linux:pcp-pmda-postgresql, p-cpe:/a:miracle:linux:pcp-manager, p-cpe:/a:miracle:linux:pcp-pmda-gpfs, p-cpe:/a:miracle:linux:pcp-pmda-rpm, p-cpe:/a:miracle:linux:pcp-pmda-bash, p-cpe:/a:miracle:linux:pcp-webapi, p-cpe:/a:miracle:linux:pcp-pmda-mysql, p-cpe:/a:miracle:linux:pcp-pmda-dm, p-cpe:/a:miracle:linux:pcp-pmda-lustre, p-cpe:/a:miracle:linux:pcp-pmda-mounts, p-cpe:/a:miracle:linux:pcp-pmda-gpsd, p-cpe:/a:miracle:linux:pcp-pmda-pdns, p-cpe:/a:miracle:linux:pcp-pmda-netfilter, p-cpe:/a:miracle:linux:pcp-selinux, cpe:/o:miracle:linux:7, p-cpe:/a:miracle:linux:perl-pcp-pmda, p-cpe:/a:miracle:linux:pcp-pmda-ds389, p-cpe:/a:miracle:linux:pcp-pmda-trace, p-cpe:/a:miracle:linux:pcp-pmda-news, p-cpe:/a:miracle:linux:pcp-pmda-shping, p-cpe:/a:miracle:linux:pcp-pmda-sendmail, p-cpe:/a:miracle:linux:pcp-conf, p-cpe:/a:miracle:linux:pcp-pmda-logger, p-cpe:/a:miracle:linux:pcp-export-pcp2graphite, p-cpe:/a:miracle:linux:pcp-libs, p-cpe:/a:miracle:linux:pcp-pmda-memcache, p-cpe:/a:miracle:linux:pcp-pmda-lustrecomm, p-cpe:/a:miracle:linux:pcp-pmda-apache, p-cpe:/a:miracle:linux:pcp-pmda-named, p-cpe:/a:miracle:linux:pcp-pmda-nginx, p-cpe:/a:miracle:linux:pcp-pmda-bonding, p-cpe:/a:miracle:linux:pcp-pmda-nvidia-gpu, p-cpe:/a:miracle:linux:pcp-pmda-ds389log, p-cpe:/a:miracle:linux:pcp-zeroconf, p-cpe:/a:miracle:linux:pcp-pmda-postfix, p-cpe:/a:miracle:linux:pcp-pmda-gfs2, p-cpe:/a:miracle:linux:pcp-pmda-weblog, p-cpe:/a:miracle:linux:pcp-pmda-mailq, p-cpe:/a:miracle:linux:pcp-doc, p-cpe:/a:miracle:linux:pcp-pmda-nfsclient, p-cpe:/a:miracle:linux:pcp-gui, p-cpe:/a:miracle:linux:pcp-pmda-lmsensors, p-cpe:/a:miracle:linux:pcp-pmda-json, p-cpe:/a:miracle:linux:pcp-pmda-elasticsearch

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/1/1

弱點發布日期: 2020/1/1

參考資訊

CVE: CVE-2019-3695, CVE-2019-3696