Debian DLA-562-1:gosa 安全更新

critical Nessus 插件 ID 92569

简介

远程 Debian 主机缺少安全更新。

描述

GOsa² 结合了系统管理员和最终用户 Web 接口,用于处理基于 LDAP 的设置。

在 GOsa 的 Samba 插件代码中发现一个代码注入漏洞。在 Samba 密码更改期间,可能会注入恶意 Perl 代码。

如果您要升级到这个经过修复的程序包修订版本,请注意,Samba 密码变更功能将停止工作,直到 gosa.conf 中的 sambaHashHook 参数进行了更新,接受 base64 编码密码字符串为止。

升级到此程序包修订版本后,请参阅 gosa.conf (5) 手册页,并应用其中所述的 gosa.conf。

对于 Debian 7“Wheezy”,这些问题已在 2.7.4-4.3~deb7u3 版本中修复。

建议您升级 gosa 程序包。

注意:Tenable Network Security 已直接从 DLA 安全公告中提取上述描述块。Tenable 已尝试在不引入其他问题的情况下尽可能进行了自动整理和排版。

解决方案

升级受影响的程序包。

另见

https://lists.debian.org/debian-lts-announce/2016/07/msg00024.html

https://packages.debian.org/source/wheezy/gosa

插件详情

严重性: Critical

ID: 92569

文件名: debian_DLA-562.nasl

版本: 2.7

类型: local

代理: unix

发布时间: 2016/7/27

最近更新时间: 2021/1/11

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 5.9

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 5.5

矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:gosa-plugin-phpgw, p-cpe:/a:debian:debian_linux:gosa-plugin-mit-krb5-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-dhcp, p-cpe:/a:debian:debian_linux:gosa-plugin-systems, p-cpe:/a:debian:debian_linux:gosa-plugin-rolemanagement, p-cpe:/a:debian:debian_linux:gosa-plugin-opengroupware, p-cpe:/a:debian:debian_linux:gosa-plugin-openxchange, p-cpe:/a:debian:debian_linux:gosa-help-nl, p-cpe:/a:debian:debian_linux:gosa-plugin-sudo-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-pureftpd, p-cpe:/a:debian:debian_linux:gosa-plugin-pureftpd-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-netatalk, p-cpe:/a:debian:debian_linux:gosa-plugin-ssh, p-cpe:/a:debian:debian_linux:gosa-help-de, p-cpe:/a:debian:debian_linux:gosa-plugin-phpgw-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-fai-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-kolab, p-cpe:/a:debian:debian_linux:gosa-plugin-dhcp-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-gofax, p-cpe:/a:debian:debian_linux:gosa-plugin-scalix, p-cpe:/a:debian:debian_linux:gosa-plugin-uw-imap, p-cpe:/a:debian:debian_linux:gosa-help-fr, p-cpe:/a:debian:debian_linux:gosa-dev, p-cpe:/a:debian:debian_linux:gosa-plugin-ssh-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-mail, p-cpe:/a:debian:debian_linux:gosa-plugin-sudo, p-cpe:/a:debian:debian_linux:gosa-plugin-webdav, p-cpe:/a:debian:debian_linux:gosa-plugin-ldapmanager, p-cpe:/a:debian:debian_linux:gosa-plugin-rsyslog, p-cpe:/a:debian:debian_linux:gosa-plugin-nagios-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-phpscheduleit, p-cpe:/a:debian:debian_linux:gosa-plugin-samba, p-cpe:/a:debian:debian_linux:gosa-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-pptp, p-cpe:/a:debian:debian_linux:gosa-plugin-dns, p-cpe:/a:debian:debian_linux:gosa-plugin-kolab-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-mit-krb5, p-cpe:/a:debian:debian_linux:gosa-plugin-opsi, p-cpe:/a:debian:debian_linux:gosa-help-en, p-cpe:/a:debian:debian_linux:gosa-plugin-phpscheduleit-schema, p-cpe:/a:debian:debian_linux:gosa, p-cpe:/a:debian:debian_linux:gosa-plugin-goto, p-cpe:/a:debian:debian_linux:gosa-desktop, p-cpe:/a:debian:debian_linux:gosa-plugin-openxchange-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-squid, cpe:/o:debian:debian_linux:7.0, p-cpe:/a:debian:debian_linux:gosa-plugin-nagios, p-cpe:/a:debian:debian_linux:gosa-plugin-dns-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-fai, p-cpe:/a:debian:debian_linux:gosa-plugin-pptp-schema, p-cpe:/a:debian:debian_linux:gosa-plugin-connectivity, p-cpe:/a:debian:debian_linux:gosa-plugin-gofon

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

易利用性: No known exploits are available

补丁发布日期: 2016/7/26

参考资料信息

CVE: CVE-2015-8771