Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:4689

Опубликовано: 03 нояб. 2020
Источник: rocky
Оценка: SEVERITY_MODERATE

Описание

Moderate: openwsman security update

Openwsman is a project intended to provide an open source implementation of the Web Services Management specification (WS-Management) and to expose system management information on the Linux operating system using the WS-Management protocol. WS-Management is based on a suite of web services specifications and usage requirements that cover all system management aspects. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libwsman1i6867.el8_3libwsman1-2.6.5-7.el8_3.i686.rpm
libwsman1x86_647.el8_3libwsman1-2.6.5-7.el8_3.x86_64.rpm
openwsman-clienti6867.el8_3openwsman-client-2.6.5-7.el8_3.i686.rpm
openwsman-clientx86_647.el8_3openwsman-client-2.6.5-7.el8_3.x86_64.rpm
openwsman-python3x86_647.el8_3openwsman-python3-2.6.5-7.el8_3.x86_64.rpm
openwsman-serveri6867.el8_3openwsman-server-2.6.5-7.el8_3.i686.rpm
openwsman-serverx86_647.el8_3openwsman-server-2.6.5-7.el8_3.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
redhat
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
nvd
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infin ...