Korean
<< Back
VID 14242
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2019-1652 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities:

- Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855)

- Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856)

- Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857)

- Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)


Note: This check solely relied on the libssh2 RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://access.redhat.com/errata/RHSA-2019:1652
https://access.redhat.com/security/cve/cve-2019-3855
https://access.redhat.com/security/cve/cve-2019-3856
https://access.redhat.com/security/cve/cve-2019-3857
https://access.redhat.com/security/cve/cve-2019-3863

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 6)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update
Related URL CVE-2019-3855,CVE-2019-3856,CVE-2019-3857,CVE-2019-3863 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)