Summary
Detail | |||
---|---|---|---|
Vendor | Mit | First view | 1998-11-05 |
Product | Kerberos | Last view | 2018-12-26 |
Version | v | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:mit:kerberos |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2018-12-26 | CVE-2018-20217 | A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request. |
6.5 | 2018-01-16 | CVE-2018-5710 | An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client. |
7.5 | 2018-01-16 | CVE-2018-5709 | An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data. |
9.8 | 2017-11-23 | CVE-2017-15088 | plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat. |
6.5 | 2016-02-12 | CVE-2015-8631 | Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name. |
3.1 | 2016-02-12 | CVE-2015-8629 | The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string. |
6.8 | 2015-11-08 | CVE-2015-2697 | The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request. |
7.1 | 2015-11-08 | CVE-2015-2696 | lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call. |
7.1 | 2015-11-08 | CVE-2015-2695 | lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call. |
3.5 | 2014-12-16 | CVE-2014-5353 | The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy. |
5 | 2014-07-20 | CVE-2014-4341 | MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session. |
4.3 | 2013-11-17 | CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. |
5 | 2013-05-29 | CVE-2002-2443 | schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. |
4 | 2013-04-19 | CVE-2013-1416 | The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request. |
7.1 | 2013-03-05 | CVE-2013-1415 | The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request. |
4.3 | 2013-03-04 | CVE-2012-1016 | The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request. |
6.5 | 2011-07-11 | CVE-2011-1526 | ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script. |
6.8 | 2010-05-19 | CVE-2010-1321 | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. |
7.4 | 2007-06-26 | CVE-2007-2798 | Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal. |
7.9 | 2007-06-26 | CVE-2007-2443 | Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value. |
9.3 | 2007-06-26 | CVE-2007-2442 | The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup. |
8.5 | 2007-04-05 | CVE-2007-1216 | Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding". |
9 | 2007-04-05 | CVE-2007-0957 | Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers. |
7.6 | 2007-04-05 | CVE-2007-0956 | The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882. |
5 | 2006-12-31 | CVE-2006-6144 | The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
55% (10) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
11% (2) | CWE-18 | Source Code |
5% (1) | CWE-617 | Reachable Assertion |
5% (1) | CWE-476 | NULL Pointer Dereference |
5% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
5% (1) | CWE-200 | Information Exposure |
5% (1) | CWE-190 | Integer Overflow or Wraparound |
5% (1) | CWE-20 | Improper Input Validation |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-28 | Fuzzing |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
CAPEC-67 | String Format Overflow in syslog() |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
73617 | Kerberos Applications GSS-API FTP Daemon EGID Privilege Matching Restriction ... |
70083 | Oracle Database MIT Kerberos 5 kg_accept_krb5 Remote Denial of Service |
64744 | Kerberos GSS-API AP-REQ Authenticator NULL Dereference Remote DoS |
36597 | MIT Kerberos 5 RPC Library gssrpc__svcauth_unix Function Remote Code Execution |
36596 | MIT Kerberos 5 RPC Library gssrpc__svcauth_gssapi Function Remote Code Execution |
36595 | MIT Kerberos kadmind rename_principal_2_svc Function Remote Overflow |
34106 | MIT Kerberos telnet Crafted Username Remote Authentication Bypass |
34105 | MIT Kerberos 5 kadmind GSS-API Library Remote Key Database Manipulation |
34104 | MIT Kerberos 5 KDC krb5_klog_syslog() Function Remote Overflow |
31280 | MIT Kerberos GSS-API mechglue Memory Management Code Execution |
12533 | MIT Kerberos 5 libkadm5srv Password History Handling Overflow |
9408 | MIT Kerberos 5 krb524d krb5_rd_cred() Arbitrary Code Execution |
9407 | MIT Kerberos 5 Double-free Error Condition Code Execution |
4895 | MIT Kerberos 5 base-65 radix_encode Arbitrary Execution |
4883 | SSH Client Kerberos 5 TGT Overflow |
4875 | MIT Kerberos 4/5 e_msg Variable kerb_err_reply Function Remote Overflow |
4873 | MIT Kerberos localrealm Variable Overflow |
4871 | MIT Kerberos lastrealm Variable Overflow |
OpenVAS Exploits
id | Description |
---|---|
2012-08-02 | Name : SuSE Update for krb5-appl openSUSE-SU-2012:0019-1 (krb5-appl) File : nvt/gb_suse_2012_0019_1.nasl |
2012-08-02 | Name : SuSE Update for krb5-appl openSUSE-SU-2012:0051-1 (krb5-appl) File : nvt/gb_suse_2012_0051_1.nasl |
2012-06-06 | Name : RedHat Update for krb5-appl RHSA-2011:0920-01 File : nvt/gb_RHSA-2011_0920-01_krb5-appl.nasl |
2012-03-16 | Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe... File : nvt/gb_VMSA-2011-0003.nasl |
2012-03-15 | Name : VMSA-2011-0013.2 VMware third party component updates for VMware vCenter Serv... File : nvt/gb_VMSA-2011-0013.nasl |
2012-03-15 | Name : VMSA-2010-0016 VMware ESXi and ESX third party updates for Service Console an... File : nvt/gb_VMSA-2010-0016.nasl |
2012-02-21 | Name : RedHat Update for krb5 RHSA-2012:0306-03 File : nvt/gb_RHSA-2012_0306-03_krb5.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-14 (mit-krb5-appl) File : nvt/glsa_201201_14.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-13 (mit-krb5) File : nvt/glsa_201201_13.nasl |
2012-01-09 | Name : Fedora Update for krb5-appl FEDORA-2011-17492 File : nvt/gb_fedora_2011_17492_krb5-appl_fc15.nasl |
2011-08-07 | Name : Debian Security Advisory DSA 2283-1 (krb5-appl) File : nvt/deb_2283_1.nasl |
2011-07-27 | Name : Mandriva Update for krb5-appl MDVSA-2011:117 (krb5-appl) File : nvt/gb_mandriva_MDVSA_2011_117.nasl |
2011-07-18 | Name : Fedora Update for krb5-appl FEDORA-2011-9080 File : nvt/gb_fedora_2011_9080_krb5-appl_fc15.nasl |
2011-07-18 | Name : Fedora Update for krb5-appl FEDORA-2011-9109 File : nvt/gb_fedora_2011_9109_krb5-appl_fc14.nasl |
2011-05-05 | Name : Fedora Update for krb5 FEDORA-2011-5343 File : nvt/gb_fedora_2011_5343_krb5_fc13.nasl |
2011-03-25 | Name : Fedora Update for krb5 FEDORA-2011-3464 File : nvt/gb_fedora_2011_3464_krb5_fc13.nasl |
2011-02-18 | Name : Fedora Update for krb5 FEDORA-2011-1210 File : nvt/gb_fedora_2011_1210_krb5_fc13.nasl |
2010-12-23 | Name : Fedora Update for krb5 FEDORA-2010-18425 File : nvt/gb_fedora_2010_18425_krb5_fc13.nasl |
2010-07-23 | Name : Ubuntu Update for krb5 vulnerability USN-940-2 File : nvt/gb_ubuntu_USN_940_2.nasl |
2010-07-12 | Name : Mandriva Update for heimdal MDVSA-2010:130 (heimdal) File : nvt/gb_mandriva_MDVSA_2010_130.nasl |
2010-06-03 | Name : Debian Security Advisory DSA 2052-1 (krb5) File : nvt/deb_2052_1.nasl |
2010-05-28 | Name : CentOS Update for krb5-devel CESA-2010:0423 centos4 i386 File : nvt/gb_CESA-2010_0423_krb5-devel_centos4_i386.nasl |
2010-05-28 | Name : Fedora Update for krb5 FEDORA-2010-8805 File : nvt/gb_fedora_2010_8805_krb5_fc12.nasl |
2010-05-28 | Name : Fedora Update for krb5 FEDORA-2010-8796 File : nvt/gb_fedora_2010_8796_krb5_fc11.nasl |
2010-05-28 | Name : Mandriva Update for krb5 MDVSA-2010:100 (krb5) File : nvt/gb_mandriva_MDVSA_2010_100.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2013-B-0130 | MIT Kerberos Denial of Service Vulnerabilities Severity: Category I - VMSKEY: V0042308 |
2013-B-0044 | MIT Kerberos Denial of Service Vulnerabilities Severity: Category I - VMSKEY: V0037773 |
2011-A-0160 | Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana... Severity: Category I - VMSKEY: V0030769 |
2011-B-0077 | MIT Kerberos Remote Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0029345 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-27 | MIT Kerberos KDC as-req sname null pointer dereference attempt RuleID : 8888889 - Type : SERVER-OTHER - Revision : 1 |
2015-03-27 | MIT Kerberos KDC as-req sname null pointer dereference attempt RuleID : 8888888 - Type : SERVER-OTHER - Revision : 1 |
2019-09-24 | MIT Kerberos kpasswd UDP denial of service attempt RuleID : 51212 - Type : SERVER-OTHER - Revision : 1 |
2015-06-23 | MIT Kerberos KDC as-req sname null pointer dereference attempt RuleID : 34972 - Type : SERVER-OTHER - Revision : 2 |
2015-06-23 | MIT Kerberos KDC as-req sname null pointer dereference attempt RuleID : 34971 - Type : SERVER-OTHER - Revision : 2 |
2014-01-10 | MIT Kerberos KDC prep_reprocess_req null pointer dereference attempt RuleID : 27906 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | MIT Kerberos V% KAdminD klog_vsyslog server overflow attempt RuleID : 16207 - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | MIT Kerberos kadmind rpc library uninitialized pointer arbitrary code executi... RuleID : 13268 - Type : RPC - Revision : 5 |
2014-01-10 | MIT Kerberos kadmind rpc library uninitialized pointer arbitrary code executi... RuleID : 13223 - Type : PROTOCOL-RPC - Revision : 6 |
2014-01-10 | MIT Kerberos kadmind auth buffer overflow attempt RuleID : 12708 - Type : PROTOCOL-RPC - Revision : 7 |
2014-01-10 | portmap 2112 udp rename_principal attempt RuleID : 12188 - Type : PROTOCOL-RPC - Revision : 8 |
2014-01-10 | portmap 2112 tcp rename_principal attempt RuleID : 12187 - Type : PROTOCOL-RPC - Revision : 11 |
2014-01-10 | portmap 2112 udp request RuleID : 12186 - Type : PROTOCOL-RPC - Revision : 9 |
2014-01-10 | portmap 2112 tcp request RuleID : 12185 - Type : PROTOCOL-RPC - Revision : 9 |
2014-01-10 | MIT Kerberos kadmind rpc library uninitialized pointer arbitrary code executi... RuleID : 12075 - Type : PROTOCOL-RPC - Revision : 10 |
2014-01-10 | MIT Kerberos kadmind RPC Library unix authentication buffer overflow attempt RuleID : 12046 - Type : PROTOCOL-RPC - Revision : 10 |
2014-01-10 | kerberos login environment variable authentication bypass attempt RuleID : 10464 - Type : PROTOCOL-TELNET - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-11 | Name: The remote Fedora host is missing a security update. File: fedora_2019-ac7e19b0c8.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7db7ccda4d.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1398.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1240.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0011.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-1_0-0093.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-2_0-0007.nasl - Type: ACT_GATHER_INFO |
2018-02-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-1265.nasl - Type: ACT_GATHER_INFO |
2018-01-19 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1007.nasl - Type: ACT_GATHER_INFO |
2018-01-19 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1008.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-2dd6c320a4.nasl - Type: ACT_GATHER_INFO |
2018-01-11 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL15552.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1266.nasl - Type: ACT_GATHER_INFO |
2017-11-09 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2948-1.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2016-1012.nasl - Type: ACT_GATHER_INFO |
2016-11-21 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201611-14.nasl - Type: ACT_GATHER_INFO |
2016-04-22 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2016-691.nasl - Type: ACT_GATHER_INFO |
2016-04-05 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20160404_krb5_on_SL7_x.nasl - Type: ACT_GATHER_INFO |
2016-04-01 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2016-0532.nasl - Type: ACT_GATHER_INFO |
2016-04-01 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2016-0532.nasl - Type: ACT_GATHER_INFO |
2016-04-01 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2016-0532.nasl - Type: ACT_GATHER_INFO |
2016-03-24 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2016-0493.nasl - Type: ACT_GATHER_INFO |
2016-03-24 | Name: The remote OracleVM host is missing a security update. File: oraclevm_OVMSA-2016-0039.nasl - Type: ACT_GATHER_INFO |
2016-03-24 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20160323_krb5_on_SL6_x.nasl - Type: ACT_GATHER_INFO |
2016-03-23 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2016-0493.nasl - Type: ACT_GATHER_INFO |