|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2002:037: heartbeat Vulnerability Assessment Details
|
SUSE-SA:2002:037: heartbeat |
||
Check for the version of the heartbeat package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2002:037 (heartbeat). Heartbeat is a monitoring service that is used to implement failover in high-availablity environments. It can be configured to monitor other systems via serial connections, or via UDP/IP. Several format string bugs have been discovered in the heartbeat package. One of these format string bugs is in the normal path of execution, all the remaining ones can only be triggered if heartbeat is running in debug mode. Since heartbeat is running with root privilege, this problem can possibly be exploited by remote attackers, provided they are able to send packets to the UDP port heartbeat is listening on (port 694 by default). Vulnerable versions of heartbeat are included in SUSE LINUX 8.0 and SUSE LINUX 8.1. As a workaround, make sure that your firewall blocks all traffic to the heartbeat UDP port. The proper fix is to upgrade to the packages provided by SUSE. In addition to fixing the format string bug, this update also changes heartbeat to perform processing of network packets as user 'nobody' instead of root. The update package for SUSE LINUX 8.1 also fixes a boot time problem with heartbeat. SUSE wishes to thank Nathan Wallwork for reporting the bug, and Alan Robertson for his assistance in dealing with this problem. For more information on this vulnerability, please refer to http://linux-ha.org/security/sec01.html Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update. Solution : http://www.suse.de/security/2002_037_heartbeat.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Patriot Viper 3 16GB DDR3 UDIMM Memory Kit - Designed for Intel & AMD Systems
$57.62
G.SKILL Ripjaws V 64GB (2x32GB) DDR4 3200MHz Desktop Memory F4-3200C16Q-128GVK
$89.95
CORSAIR Dominator Platinum RGB 64GB (2 x 32GB) DDR5 6800 (PC5 54400) Desktop Ram
$254.95
CORSAIR VENGEANCE RGB PRO SL 32GB (2x16GB) 3200MHz 288 Pin DIMM DDR4 RAM Memory
$55.00
Fanxiang DDR4 RAM 32GB 16GB x2 8GB x2 3200MHZ 3600MHZ UDIMM PC Desktop Memory
$27.99
Team T-FORCE VULCAN Z 16GB (2 x 8GB) 288-Pin PC RAM DDR4 3200 (PC4 25600) Intel
$27.99
A-Tech 8GB DDR3 1600 PC3-12800 Laptop SODIMM 204-Pin Memory RAM PC3L DDR3L 1x 8G
$11.99
Kingston 16GB Kit 2x 8GB PC3-12800U DDR3 1600MHz KVR16N11/8 Desktop Memory RAM
$15.00
16GB 2X8GB DDR3 PC3L-12800U Desktop Memory Ram DELL HP LENOVO ACER GATEWAY
$14.99
CORSAIR DOMINATOR TITANIUM 48GB (2 x 24GB) PC5-56000 (DDR5-7000) DIMM RGB Memory
$140.00
|
||
No Discussions have been posted on this vulnerability. |