www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3105
Public Scan
URL:
https://www.tenable.com/plugins/nessus/206293
Submission: On October 17 via api from IN — Scanned from DE
Submission: On October 17 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 206293 1. Nessus CENTOS 9 : OPENSSL-3.2.2-4.EL9 CRITICAL NESSUS PLUGIN ID 206293 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote CentOS host is missing a security update for openssl. DESCRIPTION The remote CentOS Linux 9 host has packages installed that are affected by a vulnerability as referenced in the openssl-3.2.2-4.el9 build changelog. - SSL_select_next_proto buffer overread (CVE-2024-5535) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. SOLUTION Update the CentOS 9 Stream openssl package. SEE ALSO https://kojihub.stream.centos.org/koji/buildinfo?buildID=67704 PLUGIN DETAILS Severity: Critical ID: 206293 File Name: centos9_openssl-3_2_2-4_67704.nasl Version: 1.1 Type: local Agent: unix Family: CentOS Local Security Checks Published: 8/28/2024 Updated: 8/28/2024 Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus RISK INFORMATION VPR Risk Factor: Medium Score: 6.0 CVSS V2 Risk Factor: High Base Score: 9.4 Temporal Score: 7 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C CVSS Score Source: CVE-2024-5535 CVSS V3 Risk Factor: Critical Base Score: 9.1 Temporal Score: 7.9 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C VULNERABILITY INFORMATION CPE: p-cpe:/a:centos:centos:openssl, p-cpe:/a:centos:centos:openssl-perl, cpe:/a:centos:centos:9, p-cpe:/a:centos:centos:openssl-devel, p-cpe:/a:centos:centos:openssl-libs Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list, Host/cpu Exploit Ease: No known exploits are available Patch Publication Date: 8/22/2024 Vulnerability Publication Date: 6/26/2024 REFERENCE INFORMATION CVE: CVE-2024-5535 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance Tenable Cloud Risk Report 2024