PCI Compliance Vulnerbilities

Support for security such as Firewalls and securing linux
Post Reply
pawelek
Posts: 1
Joined: 2014/06/18 19:40:00

PCI Compliance Vulnerbilities

Post by pawelek » 2014/06/18 19:46:31

We did a PCI compliance scan on our CentOS 5.10 and the following vulnerabilities showed up... are there any plans from CentOS to update the affected RPM's to address these vulnerabilities?

1.1.1. For portmapper
These vulnerabilities can be resolved by performing the following 5 steps. The total estimated time to perform all of these steps is 16
hours.

Upgrade librpcsecgss to 0.15.
Estimated time: 2 hours
Download and apply the upgrade from: http://www.citi.umich.edu/projects/nfsv ... rpcsecgss/
This will address 2 instances of the following issue: Kerberos "svcauth_gss_validate()" Buffer Overflow Vulnerability (kerberos-svc-authgss-
buffer-overflow).

Upgrade libtirpc to 0.1.8.
Estimated time: 2 hours
Download and apply the upgrade from: http://sourceforge.net/projects/libtirpc/files/
This will address 2 instances of the following issue: Kerberos "svcauth_gss_validate()" Buffer Overflow Vulnerability (kerberos-svc-authgss-
buffer-overflow).

Upgrade Kerberos 5 to 1.5.5.
Estimated time: 2 hours
Download and apply the upgrade from: http://web.mit.edu/Kerberos/krb5-1.5/
This will address 2 instances of the following issue: Kerberos "svcauth_gss_validate()" Buffer Overflow Vulnerability (kerberos-svc-authgss-
buffer-overflow).

Upgrade Kerberos 5 to 1.6.3.
Estimated time: 2 hours
Download and apply the upgrade from: http://web.mit.edu/Kerberos/krb5-1.6/
This will address 2 instances of the following issue: Kerberos "svcauth_gss_validate()" Buffer Overflow Vulnerability (kerberos-svc-authgss-
buffer-overflow).

Fix affected libraries
Estimated time: 8 hours
Upgrade libnsl, libc, glibc, dietlibc and any other affected libraries to the newest version.
This will address 2 instances of the following issue: "xdrmem_getbytes()" Integer Overflow Vulnerability (xdrmem-getbytes-integeroverflow).

gerald_clark
Posts: 10642
Joined: 2005/08/05 15:19:54
Location: Northern Illinois, USA

Re: PCI Compliance Vulnerbilities

Post by gerald_clark » 2014/06/18 20:35:09

You can't go by version numbers.
http://wiki.centos.org/FAQ/General read item 23.

User avatar
TrevorH
Site Admin
Posts: 33215
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: PCI Compliance Vulnerbilities

Post by TrevorH » 2014/06/18 20:49:12

And in case it's not obvious... do not do any of those upgrades!
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

User avatar
Super Jamie
Posts: 310
Joined: 2014/01/10 23:44:51

Re: PCI Compliance Vulnerbilities

Post by Super Jamie » 2014/06/20 10:53:55

Push your compliance scanner vendor to provide CVE numbers instead of meaningless garbage.

Check the relevant CVEs on the CVE database:

https://access.redhat.com/security/cve/

Post Reply