CVE-2024-53270 |
Description:
Nessus Plugin ID 216790 with High Severity
Synopsis
The remote Amazon Linux 2023 host is missing a security update.
Description
It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2025-850 advisory. Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable `http1_server_abort_dispatch` load shed point and/or use a high threshold. (CVE-2024-53270)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'dnf update ecs-service-connect-agent --releasever 2023.6.20250218' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216790
CVSS: HIGH (7.5)
February 26th, 2025 (5 months ago)
|
CVE-2024-10979 |
Description:
Nessus Plugin ID 216794 with High Severity
Synopsis
The remote Amazon Linux 2 host is missing a security update.
Description
The version of postgresql installed on the remote host is prior to 9.2.24-8. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2025-2764 advisory. Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. (CVE-2024-10979)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'yum update postgresql' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216794
CVSS: HIGH (8.8)
February 26th, 2025 (5 months ago)
|
CVE-2025-21172 |
Description:
Nessus Plugin ID 216799 with High Severity
Synopsis
The remote Amazon Linux 2023 host is missing a security update.
Description
It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-844 advisory. .NET and Visual Studio Remote Code Execution Vulnerability (CVE-2025-21172) .NET Elevation of Privilege Vulnerability (CVE-2025-21173) .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability (CVE-2025-21176)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Run 'dnf update dotnet8.0 --releasever 2023.6.20250218' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216799
CVSS: HIGH (7.5)
February 26th, 2025 (5 months ago)
|
CVE-2024-53270 |
Description:
Nessus Plugin ID 216807 with High Severity
Synopsis
The remote Amazon Linux 2 host is missing a security update.
Description
The version of ecs-service-connect-agent installed on the remote host is prior to v1.29.12.0-1. It is, therefore, affected by a vulnerability as referenced in the ALAS2ECS-2025-047 advisory. Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable `http1_server_abort_dispatch` load shed point and/or use a high threshold. (CVE-2024-53270)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'yum update ecs-service-connect-agent' to update your system.
Read more at https://www.tenab...
CVSS: HIGH (7.5)
February 26th, 2025 (5 months ago)
|
CVE-2024-45802 |
Description:
Nessus Plugin ID 216818 with High Severity
Synopsis
The remote Amazon Linux 2023 host is missing a security update.
Description
It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2025-857 advisory. Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10. (CVE-2024-45802)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'dnf update squid --releasever 2023.6.20250218' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216818
CVSS: HIGH (7.5)
February 26th, 2025 (5 months ago)
|
CVE-2022-49043 |
Description:
Nessus Plugin ID 216828 with High Severity
Synopsis
The remote Amazon Linux 2023 host is missing a security update.
Description
It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2025-862 advisory. xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. (CVE-2022-49043)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'dnf update libxml2 --releasever 2023.6.20250218' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216828
CVSS: HIGH (8.1)
February 26th, 2025 (5 months ago)
|
CVE-2024-53263 |
Description:
Nessus Plugin ID 216830 with High Severity
Synopsis
The remote Amazon Linux 2023 host is missing a security update.
Description
It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2025-851 advisory. Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time. (CVE-2024-53263)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Run 'dnf update git-lfs --releasever 2023.6.20250218' to update your system.
Read more at https://www.tenable.com/plugins/nessus/216830
CVSS: HIGH (8.5)
February 26th, 2025 (5 months ago)
|
CVE-2024-30220 |
Description: Command injection vulnerability in PLANEX COMMUNICATIONS wireless LAN routers allows a network-adjacent unauthenticated attacker to execute an arbitrary command by sending a specially crafted request to a certain port. Note that MZK-MF300N is no longer supported, therefore the update for this product is not provided.
CVSS: HIGH (8.8) EPSS Score: 3.28% SSVC Exploitation: none
February 26th, 2025 (5 months ago)
|
CVE-2024-39441 |
Description: In wifi display, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed.
CVSS: HIGH (7.1) EPSS Score: 0.01%
February 26th, 2025 (5 months ago)
|
CVE-2024-49035 |
Description: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are as follows -
CVE-2024-49035 (CVSS score: 8.7) - An improper access control
CVSS: HIGH (8.7)
February 26th, 2025 (5 months ago)
|