| VID |
14226 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The remote system does not apply CESA-2019:1492 which is bind security update. The system which does not apply the update is affected by a flaw found in the way bind implemented tunable which limited imultaneous TCP client connections.
Note: This check solely relied on the thunderbird RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://lists.centos.org/pipermail/centos-announce/2019-June/023331.html
* Platforms Affected: CentOS Linux Server (v. 6) |
| Recommendation |
Update the affected packages. Launch the graphical update tool through System -> Administration -> Software Update
For a command line interface, use the following command to update the operating system: # yum update |
| Related URL |
CVE-2018-5743 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|