www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3005
Public Scan
URL:
https://www.tenable.com/plugins/nessus/205049
Submission: On October 17 via api from IN — Scanned from US
Submission: On October 17 via api from IN — Scanned from US
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 205049 1. Nessus CBL MARINER 2.0 SECURITY UPDATE: KRB5 (CVE-2024-37371) CRITICAL NESSUS PLUGIN ID 205049 * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote CBL Mariner host is missing one or more security updates. DESCRIPTION The version of krb5 installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2024-37371 advisory. - In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. (CVE-2024-37371) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. SOLUTION Update the affected packages. SEE ALSO https://nvd.nist.gov/vuln/detail/CVE-2024-37371 PLUGIN DETAILS Severity: Critical ID: 205049 File Name: mariner_CVE-2024-37371.nasl Version: 1.2 Type: local Family: MarinerOS Local Security Checks Published: 8/6/2024 Updated: 8/28/2024 Supported Sensors: Nessus RISK INFORMATION VPR Risk Factor: Medium Score: 6.0 CVSS V2 Risk Factor: High Base Score: 9.4 Temporal Score: 7 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C CVSS Score Source: CVE-2024-37371 CVSS V3 Risk Factor: Critical Base Score: 9.1 Temporal Score: 7.9 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C VULNERABILITY INFORMATION CPE: p-cpe:/a:microsoft:cbl-mariner:krb5-lang, x-cpe:/o:microsoft:cbl-mariner, p-cpe:/a:microsoft:cbl-mariner:krb5-devel, p-cpe:/a:microsoft:cbl-mariner:krb5 Required KB Items: Host/local_checks_enabled, Host/cpu, Host/CBLMariner/release, Host/CBLMariner/rpm-list Exploit Ease: No known exploits are available Patch Publication Date: 8/1/2024 Vulnerability Publication Date: 6/28/2024 REFERENCE INFORMATION CVE: CVE-2024-37371 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance Tenable Cloud Risk Report 2024