| VID |
14243 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The remote system does not apply RHSA-2019-0679 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities:
- Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855)
- Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856)
- Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857)
- Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)
Note: This check solely relied on the libssh2 RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://access.redhat.com/errata/RHSA-2019:0679 https://access.redhat.com/security/cve/cve-2019-3855 https://access.redhat.com/security/cve/cve-2019-3856 https://access.redhat.com/security/cve/cve-2019-3857 https://access.redhat.com/security/cve/cve-2019-3863
* Platforms Affected: Red Hat Enterprise Linux Server (v. 7) |
| Recommendation |
Update the affected packages. Launch the graphical update tool through Applications -> System Tools -> Software Update
For a command line interface, use the following command to update the operating system: # yum update |
| Related URL |
CVE-2019-3855,CVE-2019-3856,CVE-2019-3857,CVE-2019-3863 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|