MagicLinux 7pcp-4.3.2-12.el7 (AXSA:2020-703:06)

high Nessus 插件 ID 293890

简介

远程iraclelinux 主机缺少一个或多个安全更新。

描述

远程iraclelinux 7 主机上存在安装的程序包该程序包受到 AXSA:2020-703:06 公告中提及的多个漏洞的影响。

pcppcp spec 文件 %post 部分中的本地权限升级CVE-2019-3695SUSE Linux Enterprise High Performance Computing 15-ESPOS 的 pcp 打包中存在一个代码生成不当控制漏洞SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12-SP5 openSUSE Leap 15.1 允许用户 pcp 通过将代码放置在 /var/log/pcp/configs.sh 中来以 root 身份运行。此问题会影响低于 3.11.9-5.8.1的 SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp.3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。
SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。
pcp通过 migrate_tempdirs 在 pcp spec 文件中提升本地权限 (CVE-2019-3696) SUSE Linux Enterprise High Performance Computing 15-ESPOS 的 pcp 打包中的一个对受限制目录的路径名称不当限制、SUSE Linux Enterprise High Performance Computing 15- LTSS、 SUSE Linux Enterprise Module for Development Tools 15、SUSE Linux Enterprise Module for Development Tools 15-SP1、SUSE Linux Enterprise Module for Open Buildservice Development Tools 15、SUSE Linux Enterprise Server 15-LTSS、SUSE Linux Enterprise Server for SAP 15、SUSE Linux Enterprise Software Development Kit 12-SP4、SUSE Linux Enterprise Software Development Kit 12-SP5 openSUSE Leap 15.1 允许本地用户 pcp用任意内容覆盖任意文件。该问题会影响到低于 3.11.9-5.8.1的SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp 版本。SUSE Linux Enterprise High Performance Computing 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp 4.3.1-3.5.3 之前版本。SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp.3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server 15-LTSS pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Server for SAP 15 pcp 3.11.9-5.8.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP4 pcp 3.11.9-6.14.1 之前版本。SUSE Linux Enterprise Software Development Kit 12-SP5 pcp 3.11.9-6.14.1 之前版本。openSUSE Leap 15.1 pcp 4.3.1-lp151.2.3.1 之前版本。

Tenable 已直接从MiracleLinux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://tsn.miraclelinux.com/en/node/11884

插件详情

严重性: High

ID: 293890

文件名: miracle_linux_AXSA-2020-703.nasl

版本: 1.1

类型: local

发布时间: 2026/1/20

最近更新时间: 2026/1/20

支持的传感器: Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

Vendor

Vendor Severity: High

CVSS v2

风险因素: High

基本分数: 7.2

时间分数: 5.6

矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2019-3695

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 7

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:miracle:linux:pcp-pmda-zswap, p-cpe:/a:miracle:linux:pcp-pmda-summary, p-cpe:/a:miracle:linux:pcp-pmda-activemq, p-cpe:/a:miracle:linux:python-pcp, p-cpe:/a:miracle:linux:pcp-pmda-unbound, p-cpe:/a:miracle:linux:pcp-pmda-gluster, p-cpe:/a:miracle:linux:pcp-pmda-roomtemp, p-cpe:/a:miracle:linux:pcp-pmda-dbping, p-cpe:/a:miracle:linux:pcp-system-tools, p-cpe:/a:miracle:linux:pcp-pmda-cisco, p-cpe:/a:miracle:linux:pcp, p-cpe:/a:miracle:linux:pcp-pmda-postgresql, p-cpe:/a:miracle:linux:pcp-manager, p-cpe:/a:miracle:linux:pcp-pmda-gpfs, p-cpe:/a:miracle:linux:pcp-pmda-rpm, p-cpe:/a:miracle:linux:pcp-pmda-bash, p-cpe:/a:miracle:linux:pcp-webapi, p-cpe:/a:miracle:linux:pcp-pmda-mysql, p-cpe:/a:miracle:linux:pcp-pmda-dm, p-cpe:/a:miracle:linux:pcp-pmda-lustre, p-cpe:/a:miracle:linux:pcp-pmda-mounts, p-cpe:/a:miracle:linux:pcp-pmda-gpsd, p-cpe:/a:miracle:linux:pcp-pmda-pdns, p-cpe:/a:miracle:linux:pcp-pmda-netfilter, p-cpe:/a:miracle:linux:pcp-selinux, cpe:/o:miracle:linux:7, p-cpe:/a:miracle:linux:perl-pcp-pmda, p-cpe:/a:miracle:linux:pcp-pmda-ds389, p-cpe:/a:miracle:linux:pcp-pmda-trace, p-cpe:/a:miracle:linux:pcp-pmda-news, p-cpe:/a:miracle:linux:pcp-pmda-shping, p-cpe:/a:miracle:linux:pcp-pmda-sendmail, p-cpe:/a:miracle:linux:pcp-conf, p-cpe:/a:miracle:linux:pcp-pmda-logger, p-cpe:/a:miracle:linux:pcp-export-pcp2graphite, p-cpe:/a:miracle:linux:pcp-libs, p-cpe:/a:miracle:linux:pcp-pmda-memcache, p-cpe:/a:miracle:linux:pcp-pmda-lustrecomm, p-cpe:/a:miracle:linux:pcp-pmda-apache, p-cpe:/a:miracle:linux:pcp-pmda-named, p-cpe:/a:miracle:linux:pcp-pmda-nginx, p-cpe:/a:miracle:linux:pcp-pmda-bonding, p-cpe:/a:miracle:linux:pcp-pmda-nvidia-gpu, p-cpe:/a:miracle:linux:pcp-pmda-ds389log, p-cpe:/a:miracle:linux:pcp-zeroconf, p-cpe:/a:miracle:linux:pcp-pmda-postfix, p-cpe:/a:miracle:linux:pcp-pmda-gfs2, p-cpe:/a:miracle:linux:pcp-pmda-weblog, p-cpe:/a:miracle:linux:pcp-pmda-mailq, p-cpe:/a:miracle:linux:pcp-doc, p-cpe:/a:miracle:linux:pcp-pmda-nfsclient, p-cpe:/a:miracle:linux:pcp-gui, p-cpe:/a:miracle:linux:pcp-pmda-lmsensors, p-cpe:/a:miracle:linux:pcp-pmda-json, p-cpe:/a:miracle:linux:pcp-pmda-elasticsearch

必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

可利用: true

易利用性: Exploits are available

补丁发布日期: 2020/1/1

漏洞发布日期: 2020/1/1

参考资料信息

CVE: CVE-2019-3695, CVE-2019-3696