Executive Summary
Summary | |
---|---|
Title | openssl security update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:1940 | First vendor Publication | 2016-09-27 |
Vendor | RedHat | Last vendor Modification | 2016-09-27 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) * It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) * It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) * A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) * An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) * A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. * An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) * Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) * An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) * Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304 and CVE-2016-6306; and Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() 1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-1940.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
20 % | CWE-125 | Out-of-bounds Read |
10 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
10 % | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory Leak') |
10 % | CWE-399 | Resource Management Errors |
10 % | CWE-203 | Information Exposure Through Discrepancy |
10 % | CWE-200 | Information Exposure |
10 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
10 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
10 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-11-08 | OpenSSL OCSP Status Request Extension denial of service attempt RuleID : 40360 - Revision : 3 - Type : SERVER-OTHER |
2016-10-18 | SSH weak blowfish cipher suite use attempt RuleID : 40190 - Revision : 2 - Type : POLICY-OTHER |
2016-10-18 | SSH weak 3DES cipher suite use attempt RuleID : 40189 - Revision : 2 - Type : POLICY-OTHER |
2016-10-18 | SSL weak 3DES cipher suite use attempt RuleID : 40188 - Revision : 2 - Type : POLICY-OTHER |
2016-10-18 | SSL weak 3DES cipher suite use attempt RuleID : 40187 - Revision : 2 - Type : POLICY-OTHER |
2016-10-18 | SSL weak 3DES cipher suite use attempt RuleID : 40186 - Revision : 2 - Type : POLICY-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-07-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-2123.nasl - Type : ACT_GATHER_INFO |
2018-02-28 | Name : The version of Arista Networks EOS running on the remote device is affected b... File : arista_eos_sa0024.nasl - Type : ACT_GATHER_INFO |
2018-02-28 | Name : The version of Arista Networks EOS running on the remote device is affected b... File : arista_eos_sa0024_4_17.nasl - Type : ACT_GATHER_INFO |
2017-11-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-3240.nasl - Type : ACT_GATHER_INFO |
2017-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-3113.nasl - Type : ACT_GATHER_INFO |
2017-10-20 | Name : A network management system installed on the remote host is affected by multi... File : oracle_ilom_3_2_6.nasl - Type : ACT_GATHER_INFO |
2017-09-20 | Name : The remote VMware ESXi 6.0 host is affected by multiple vulnerabilities. File : vmware_esxi_6_0_build_5485776_remote.nasl - Type : ACT_GATHER_INFO |
2017-09-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-2709.nasl - Type : ACT_GATHER_INFO |
2017-09-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-2710.nasl - Type : ACT_GATHER_INFO |
2017-09-13 | Name : The version of Java SDK installed on the remote AIX host is affected by multi... File : aix_java_jan2017_advisory.nasl - Type : ACT_GATHER_INFO |
2017-08-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-2493.nasl - Type : ACT_GATHER_INFO |
2017-07-20 | Name : A web application installed on the remote host is affected by multiple vulner... File : oracle_e-business_cpu_jul_2017.nasl - Type : ACT_GATHER_INFO |
2017-07-20 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_jul_2017.nasl - Type : ACT_GATHER_INFO |
2017-07-13 | Name : The remote Virtuozzo host is missing a security update. File : Virtuozzo_VZLSA-2017-0180.nasl - Type : ACT_GATHER_INFO |
2017-07-13 | Name : The remote Virtuozzo host is missing a security update. File : Virtuozzo_VZLSA-2017-0269.nasl - Type : ACT_GATHER_INFO |
2017-07-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201707-01.nasl - Type : ACT_GATHER_INFO |
2017-06-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-1658.nasl - Type : ACT_GATHER_INFO |
2017-06-26 | Name : The Tenable SecurityCenter application on the remote host contains an OpenSSL... File : securitycenter_openssl_1_0_1u.nasl - Type : ACT_GATHER_INFO |
2017-06-09 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL53084033.nasl - Type : ACT_GATHER_INFO |
2017-05-31 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-1444-1.nasl - Type : ACT_GATHER_INFO |
2017-05-24 | Name : A database server installed on the remote host is affected by multiple vulner... File : ibm_informix_server_swg22002897.nasl - Type : ACT_GATHER_INFO |
2017-05-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-1216.nasl - Type : ACT_GATHER_INFO |
2017-05-02 | Name : An application installed on the remote host is affected by multiple vulnerabi... File : oracle_secure_global_desktop_apr_2017_cpu.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2016-1047.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2016-1090.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1015.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1016.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1027.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1028.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1039.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1040.nasl - Type : ACT_GATHER_INFO |
2017-04-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3270-1.nasl - Type : ACT_GATHER_INFO |
2017-04-21 | Name : An enterprise management application installed on the remote host is affected... File : oracle_enterprise_manager_apr_2017_cpu.nasl - Type : ACT_GATHER_INFO |
2017-03-30 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0839-1.nasl - Type : ACT_GATHER_INFO |
2017-03-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0716-1.nasl - Type : ACT_GATHER_INFO |
2017-03-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0719-1.nasl - Type : ACT_GATHER_INFO |
2017-03-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0720-1.nasl - Type : ACT_GATHER_INFO |
2017-03-16 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL01276005.nasl - Type : ACT_GATHER_INFO |
2017-03-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0462.nasl - Type : ACT_GATHER_INFO |
2017-03-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13167034.nasl - Type : ACT_GATHER_INFO |
2017-03-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL90492697.nasl - Type : ACT_GATHER_INFO |
2017-03-01 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL23873366.nasl - Type : ACT_GATHER_INFO |
2017-03-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0336.nasl - Type : ACT_GATHER_INFO |
2017-03-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0337.nasl - Type : ACT_GATHER_INFO |
2017-03-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0338.nasl - Type : ACT_GATHER_INFO |
2017-02-21 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-278.nasl - Type : ACT_GATHER_INFO |
2017-02-21 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0490-1.nasl - Type : ACT_GATHER_INFO |
2017-02-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3198-1.nasl - Type : ACT_GATHER_INFO |
2017-02-15 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-797.nasl - Type : ACT_GATHER_INFO |
2017-02-15 | Name : An application running on the remote host is affected by multiple vulnerabili... File : nessus_tns_2016_16.nasl - Type : ACT_GATHER_INFO |
2017-02-15 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0460-1.nasl - Type : ACT_GATHER_INFO |
2017-02-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-0269.nasl - Type : ACT_GATHER_INFO |
2017-02-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-0269.nasl - Type : ACT_GATHER_INFO |
2017-02-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0269.nasl - Type : ACT_GATHER_INFO |
2017-02-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170213_java_1_7_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2017-02-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3194-1.nasl - Type : ACT_GATHER_INFO |
2017-02-06 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-201.nasl - Type : ACT_GATHER_INFO |
2017-02-01 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0346-1.nasl - Type : ACT_GATHER_INFO |
2017-02-01 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3181-1.nasl - Type : ACT_GATHER_INFO |
2017-01-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0194.nasl - Type : ACT_GATHER_INFO |
2017-01-27 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-791.nasl - Type : ACT_GATHER_INFO |
2017-01-27 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0193.nasl - Type : ACT_GATHER_INFO |
2017-01-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-65.nasl - Type : ACT_GATHER_INFO |
2017-01-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3179-1.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : A web application running on the remote host is affected by multiple vulnerab... File : mysql_enterprise_monitor_3_1_5_7958.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : A web application running on the remote host is affected by multiple vulnerab... File : mysql_enterprise_monitor_3_2_5_1141.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : A web application running on the remote host is affected by multiple vulnerab... File : mysql_enterprise_monitor_3_3_1_1112.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170120_java_1_8_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2017-01-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-0180.nasl - Type : ACT_GATHER_INFO |
2017-01-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-0180.nasl - Type : ACT_GATHER_INFO |
2017-01-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0180.nasl - Type : ACT_GATHER_INFO |
2017-01-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0175.nasl - Type : ACT_GATHER_INFO |
2017-01-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0176.nasl - Type : ACT_GATHER_INFO |
2017-01-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0177.nasl - Type : ACT_GATHER_INFO |
2017-01-19 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_jan_2017.nasl - Type : ACT_GATHER_INFO |
2017-01-19 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_jan_2017_unix.nasl - Type : ACT_GATHER_INFO |
2017-01-06 | Name : A vulnerability scanner installed on the remote host is affected by multiple ... File : pvs_5_2_0.nasl - Type : ACT_GATHER_INFO |
2017-01-05 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10759.nasl - Type : ACT_GATHER_INFO |
2016-12-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-363-01.nasl - Type : ACT_GATHER_INFO |
2016-12-27 | Name : An application running on the remote web server is affected by multiple vulne... File : ibm_bigfix_remote_control_9_1_3.nasl - Type : ACT_GATHER_INFO |
2016-12-16 | Name : The remote host is missing a macOS update that fixes multiple security vulner... File : macos_10_12_2.nasl - Type : ACT_GATHER_INFO |
2016-12-16 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2016-007.nasl - Type : ACT_GATHER_INFO |
2016-12-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201612-16.nasl - Type : ACT_GATHER_INFO |
2016-11-22 | Name : The remote AIX host has a version of OpenSSL installed that is affected by mu... File : aix_openssl_advisory21.nasl - Type : ACT_GATHER_INFO |
2016-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2802.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL02652550.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-64e0743e16.nasl - Type : ACT_GATHER_INFO |
2016-11-14 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1289.nasl - Type : ACT_GATHER_INFO |
2016-11-11 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1283.nasl - Type : ACT_GATHER_INFO |
2016-11-03 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL54211024.nasl - Type : ACT_GATHER_INFO |
2016-11-01 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL23512141.nasl - Type : ACT_GATHER_INFO |
2016-11-01 | Name : The remote service supports the use of 64-bit block ciphers. File : ssl_64bitblock_supported_ciphers.nasl - Type : ACT_GATHER_INFO |
2016-10-31 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL59298921.nasl - Type : ACT_GATHER_INFO |
2016-10-21 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_6_34_rpm.nasl - Type : ACT_GATHER_INFO |
2016-10-21 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_7_16_rpm.nasl - Type : ACT_GATHER_INFO |
2016-10-20 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_6_34.nasl - Type : ACT_GATHER_INFO |
2016-10-20 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_7_16.nasl - Type : ACT_GATHER_INFO |
2016-10-20 | Name : An application installed on the remote host is affected by multiple vulnerabi... File : virtualbox_5_1_8.nasl - Type : ACT_GATHER_INFO |
2016-10-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1189.nasl - Type : ACT_GATHER_INFO |
2016-10-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-3627.nasl - Type : ACT_GATHER_INFO |
2016-10-17 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2016-0141.nasl - Type : ACT_GATHER_INFO |
2016-10-13 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-755.nasl - Type : ACT_GATHER_INFO |
2016-10-12 | Name : The remote Fedora host is missing a security update. File : fedora_2016-97454404fe.nasl - Type : ACT_GATHER_INFO |
2016-10-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1172.nasl - Type : ACT_GATHER_INFO |
2016-10-07 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2468-1.nasl - Type : ACT_GATHER_INFO |
2016-10-06 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2458-1.nasl - Type : ACT_GATHER_INFO |
2016-09-30 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_1u.nasl - Type : ACT_GATHER_INFO |
2016-09-30 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_2i.nasl - Type : ACT_GATHER_INFO |
2016-09-30 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_1_0a.nasl - Type : ACT_GATHER_INFO |
2016-09-29 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160927_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1940.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote Fedora host is missing a security update. File : fedora_2016-a555159613.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1130.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1134.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1940.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2016-0135.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1940.nasl - Type : ACT_GATHER_INFO |
2016-09-28 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2394-1.nasl - Type : ACT_GATHER_INFO |
2016-09-27 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2387-1.nasl - Type : ACT_GATHER_INFO |
2016-09-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-637.nasl - Type : ACT_GATHER_INFO |
2016-09-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3087-2.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-266-01.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-749.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3673.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_43eaa65680bc11e6bf52b499baebfeaf.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3087-1.nasl - Type : ACT_GATHER_INFO |
2016-08-25 | Name : The service running on the remote host uses a weak encryption block cipher by... File : openssl_1_1_0.nasl - Type : ACT_GATHER_INFO |
2016-07-25 | Name : The remote web server is affected by multiple vulnerabilities. File : oracle_http_server_cpu_jul_2016.nasl - Type : ACT_GATHER_INFO |
2016-07-01 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_0ca246823f0311e6b3c814dae9d210b8.nasl - Type : ACT_GATHER_INFO |
2016-06-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_6f0529e22e8211e6b2ecb499baebfeaf.nasl - Type : ACT_GATHER_INFO |
2015-10-23 | Name : The remote web server is affected by multiple vulnerabilities. File : oracle_http_server_cpu_oct_2015.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote web server is affected by multiple vulnerabilities. File : oracle_http_server_cpu_jan_2015.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-09-29 13:25:19 |
|
2016-09-27 21:23:49 |
|
2016-09-27 17:22:57 |
|