Linux Distros 未修补的漏洞: CVE-2024-3661

low Nessus 插件 ID 229223

简介

Linux/Unix 主机上安装的一个或多个程序包存在漏洞,但供应商表示不会修补此漏洞。

描述

Linux/Unix 主机中安装的一个或多个程序包受到一个漏洞影响,而供应商没有提供补丁程序。

- DHCP 可以通过无类静态路由选项 (121) 将路由添加到客户端的路由表。依赖路由重定向流量的 VPN 类安全解决方案可能会强制通过物理接口泄漏流量。同一本地网络上的攻击者可以读取、中断或者可能修改预期受 VPN 保护的网络流量。(CVE-2024-3661)

请注意,Nessus 依赖供应商报告的程序包是否存在进行判断。

解决方案

目前尚未有任何已知的解决方案。

另见

https://access.redhat.com/security/cve/cve-2024-3661

https://ubuntu.com/security/CVE-2024-3661

插件详情

严重性: Low

ID: 229223

文件名: unpatched_CVE_2024_3661.nasl

版本: 1.2

类型: local

代理: unix

系列: Misc.

发布时间: 2025/3/5

最近更新时间: 2025/8/11

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 5.5

CVSS v2

风险因素: Medium

基本分数: 4.8

时间分数: 3.8

矢量: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:N

CVSS 分数来源: CVE-2024-3661

CVSS v3

风险因素: High

基本分数: 7.6

时间分数: 6.8

矢量: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

风险因素: Low

Base Score: 2.1

Threat Score: 1.2

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:networkmanager-config-routing-rules, p-cpe:/a:redhat:enterprise_linux:networkmanager-config-server, p-cpe:/a:centos:centos:networkmanager-glib-devel, p-cpe:/a:canonical:ubuntu_linux:sshuttle, p-cpe:/a:centos:centos:networkmanager-ovs, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:redhat:enterprise_linux:networkmanager-wifi, p-cpe:/a:centos:centos:networkmanager-wifi, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:mozillavpn, p-cpe:/a:canonical:ubuntu_linux:n2n, p-cpe:/a:centos:centos:networkmanager-wwan, p-cpe:/a:redhat:enterprise_linux:networkmanager-adsl, p-cpe:/a:canonical:ubuntu_linux:libreswan, p-cpe:/a:canonical:ubuntu_linux:kvpnc, cpe:/o:centos:centos:7, p-cpe:/a:centos:centos:networkmanager-glib, p-cpe:/a:canonical:ubuntu_linux:tinc, p-cpe:/a:centos:centos:networkmanager-libnm-devel, p-cpe:/a:centos:centos:networkmanager, p-cpe:/a:redhat:enterprise_linux:networkmanager, p-cpe:/a:canonical:ubuntu_linux:openconnect, p-cpe:/a:canonical:ubuntu_linux:pptpd, p-cpe:/a:redhat:enterprise_linux:networkmanager-dispatcher-routing-rules, p-cpe:/a:redhat:enterprise_linux:networkmanager-ppp, p-cpe:/a:centos:centos:networkmanager-adsl, p-cpe:/a:centos:centos:networkmanager-team, p-cpe:/a:redhat:enterprise_linux:networkmanager-ovs, p-cpe:/a:canonical:ubuntu_linux:network-manager-strongswan, p-cpe:/a:centos:centos:networkmanager-dispatcher-routing-rules, p-cpe:/a:centos:centos:networkmanager-config-server, p-cpe:/a:canonical:ubuntu_linux:network-manager-pptp, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:softether-vpn, p-cpe:/a:redhat:enterprise_linux:networkmanager-glib, p-cpe:/a:centos:centos:networkmanager-config-routing-rules, p-cpe:/a:redhat:enterprise_linux:networkmanager-glib-devel, cpe:/o:canonical:ubuntu_linux:25.04, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:canonical:ubuntu_linux:riseup-vpn, p-cpe:/a:centos:centos:networkmanager-devel, p-cpe:/a:centos:centos:networkmanager-bluetooth, p-cpe:/a:canonical:ubuntu_linux:vpnc, p-cpe:/a:redhat:enterprise_linux:networkmanager-tui, p-cpe:/a:canonical:ubuntu_linux:network-manager-iodine, p-cpe:/a:centos:centos:networkmanager-gnome, p-cpe:/a:canonical:ubuntu_linux:network-manager-fortisslvpn, p-cpe:/a:canonical:ubuntu_linux:pptp-linux, p-cpe:/a:redhat:enterprise_linux:networkmanager-wwan, p-cpe:/a:canonical:ubuntu_linux:network-manager-l2tp, p-cpe:/a:redhat:enterprise_linux:networkmanager-bluetooth, p-cpe:/a:canonical:ubuntu_linux:connman, p-cpe:/a:canonical:ubuntu_linux:openvpn, p-cpe:/a:canonical:ubuntu_linux:openfortivpn, p-cpe:/a:redhat:enterprise_linux:networkmanager-devel, p-cpe:/a:centos:centos:networkmanager-libnm, p-cpe:/a:canonical:ubuntu_linux:network-manager-vpnc, p-cpe:/a:redhat:enterprise_linux:networkmanager-libnm, p-cpe:/a:canonical:ubuntu_linux:quicktun, p-cpe:/a:canonical:ubuntu_linux:network-manager-openconnect, p-cpe:/a:centos:centos:networkmanager-ppp, p-cpe:/a:redhat:enterprise_linux:networkmanager-team, p-cpe:/a:canonical:ubuntu_linux:gadmin-openvpn-client, p-cpe:/a:canonical:ubuntu_linux:network-manager-openvpn, p-cpe:/a:redhat:enterprise_linux:networkmanager-gnome, p-cpe:/a:redhat:enterprise_linux:networkmanager-libnm-devel, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:centos:centos:networkmanager-tui, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:canonical:ubuntu_linux:golang-github-apparentlymart-go-openvpn-mgmt, p-cpe:/a:canonical:ubuntu_linux:wireguard, p-cpe:/a:canonical:ubuntu_linux:network-manager-sstp, p-cpe:/a:canonical:ubuntu_linux:gadmin-openvpn-server

必需的 KB 项: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

可利用: true

易利用性: Exploits are available

漏洞发布日期: 2024/5/6

参考资料信息

CVE: CVE-2024-3661