Sudo stack based buffer overflow vulnerability pwfeedback

Description of the vulnerability: A stack-based buffer overflow vulnerability was discovered in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the “pwfeedback” option enabled. An unprivileged user can take advantage of this flaw to obtain full root privileges. If enabled, users can trigger a stack-based buffer overflow in the privileged sudo

Read more

PPPD Remote Code Execution Vulnerability “Ghostcat”

Snippet of the vulnerability from the Qualys report. ID: CVE-2020-8597Title: pppd EAP Processing Buffer Overflow Vulnerability (“Ghostcat”)Vendor: Multi-VendorDescription: pppd (Point to Point Protocol Daemon) is vulnerable to buffer overflow due to a flaw in Extensible Authentication Protocol (EAP) packet processing in eap_request and eap_response subroutines. The vulnerability is in the logic of the eap parsing code. By sending an unsolicited

Read more

HTTP Security Header Not Detected

The following is the excerpt from Qualys Scan report: Vulnerability: HTTP Security Header Not DetectedQID: 11827 Reported on Port : 80/tcpTHREAT:This QID reports the absence of the following HTTP headers: X-Frame-OptionsX-XSS-ProtectionX-Content-Type-Options IMPACT:Depending on the vulnerability being exploited, an unauthenticated remote attacker could conduct cross-site scripting, clickjacking or MIME-type sniffing attacks. SOLUTION:Depending on their server software, customers are advised to set

Read more

SSL Certificate – Server Public Key Too Small

Snippet of the vulnerability from the Qualys report. Vulnerability: SSL Certificate – Server Public Key Too SmallReported: On Port 443/tcp over SSLQID: 38171THREAT: An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server’s Certificate and extracts the Public Key in the Certificate to

Read more

SSH Server Public Key Too Small

We will look at one more interesting SSH vulnerability reported by Qualys scanner appliance on RHEL6 servers. This one is classified as Confirmed Severity 2 (Medium) vulnerability level with PCI Vulnerable. Below is the vulnerability details from scan report Vulnerability: SSH Server Public Key Too SmallQID: 38738Category: General remote services PCI Vuln: YesTHREAT: The SSH protocol (Secure Shell) is a

Read more

Deprecated SSH Cryptographic Settings

Our security scanner Qualys reported the vulnerability “Deprecated SSH Cryptographic Settings” across RHEL6 & RHEL7 fleet servers. The scan report provided description of the threat posed by the vulnerability, recommendation for correcting the problem and the result which shows how Qualys verified the vulnerability. Vulnerability : Deprecated SSH Cryptographic SettingsQID: 38739THREAT: The SSH protocol (Secure Shell) is a method for

Read more