RHEL 7 : OpenShift Container Platform 3.9 (RHSA-2018:2013)

critical Nessus Plugin ID 119401

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:2013 advisory.

- Routing: Malicous Service configuration can bring down routing for an entire shard. (CVE-2018-1070)

- openshift-ansible: Incorrectly quoted values in etcd.conf causes disabling of SSL client certificate authentication (CVE-2018-1085)

- source-to-image: Builder images with assembler-user LABEL set to root allows attackers to execute arbitrary code (CVE-2018-10843)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1554145

https://bugzilla.redhat.com/show_bug.cgi?id=1554239

https://bugzilla.redhat.com/show_bug.cgi?id=1557040

https://bugzilla.redhat.com/show_bug.cgi?id=1557822

https://bugzilla.redhat.com/show_bug.cgi?id=1558183

https://bugzilla.redhat.com/show_bug.cgi?id=1558997

https://bugzilla.redhat.com/show_bug.cgi?id=1560311

https://bugzilla.redhat.com/show_bug.cgi?id=1563150

https://bugzilla.redhat.com/show_bug.cgi?id=1563673

https://bugzilla.redhat.com/show_bug.cgi?id=1566238

https://bugzilla.redhat.com/show_bug.cgi?id=1568815

https://bugzilla.redhat.com/show_bug.cgi?id=1569030

https://bugzilla.redhat.com/show_bug.cgi?id=1570065

https://bugzilla.redhat.com/show_bug.cgi?id=1570581

https://bugzilla.redhat.com/show_bug.cgi?id=1571601

https://bugzilla.redhat.com/show_bug.cgi?id=1571944

https://bugzilla.redhat.com/show_bug.cgi?id=1572786

https://bugzilla.redhat.com/show_bug.cgi?id=1579096

https://bugzilla.redhat.com/show_bug.cgi?id=1580538

https://bugzilla.redhat.com/show_bug.cgi?id=1583895

https://bugzilla.redhat.com/show_bug.cgi?id=1585243

https://bugzilla.redhat.com/show_bug.cgi?id=1586076

https://bugzilla.redhat.com/show_bug.cgi?id=1588009

https://bugzilla.redhat.com/show_bug.cgi?id=1588768

http://www.nessus.org/u?990ae81e

http://www.nessus.org/u?b353fb8c

https://access.redhat.com/errata/RHSA-2018:2013

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1466390

https://bugzilla.redhat.com/show_bug.cgi?id=1498398

https://bugzilla.redhat.com/show_bug.cgi?id=1506175

https://bugzilla.redhat.com/show_bug.cgi?id=1507429

https://bugzilla.redhat.com/show_bug.cgi?id=1512042

https://bugzilla.redhat.com/show_bug.cgi?id=1525642

https://bugzilla.redhat.com/show_bug.cgi?id=1529575

https://bugzilla.redhat.com/show_bug.cgi?id=1531096

https://bugzilla.redhat.com/show_bug.cgi?id=1534311

https://bugzilla.redhat.com/show_bug.cgi?id=1534894

https://bugzilla.redhat.com/show_bug.cgi?id=1537872

https://bugzilla.redhat.com/show_bug.cgi?id=1538215

https://bugzilla.redhat.com/show_bug.cgi?id=1539252

https://bugzilla.redhat.com/show_bug.cgi?id=1539310

https://bugzilla.redhat.com/show_bug.cgi?id=1539529

https://bugzilla.redhat.com/show_bug.cgi?id=1539757

https://bugzilla.redhat.com/show_bug.cgi?id=1540819

https://bugzilla.redhat.com/show_bug.cgi?id=1541212

https://bugzilla.redhat.com/show_bug.cgi?id=1541350

https://bugzilla.redhat.com/show_bug.cgi?id=1542387

https://bugzilla.redhat.com/show_bug.cgi?id=1542460

https://bugzilla.redhat.com/show_bug.cgi?id=1546097

https://bugzilla.redhat.com/show_bug.cgi?id=1546324

https://bugzilla.redhat.com/show_bug.cgi?id=1546936

https://bugzilla.redhat.com/show_bug.cgi?id=1548677

https://bugzilla.redhat.com/show_bug.cgi?id=1549060

https://bugzilla.redhat.com/show_bug.cgi?id=1549454

https://bugzilla.redhat.com/show_bug.cgi?id=1550193

https://bugzilla.redhat.com/show_bug.cgi?id=1550316

https://bugzilla.redhat.com/show_bug.cgi?id=1550385

https://bugzilla.redhat.com/show_bug.cgi?id=1550591

https://bugzilla.redhat.com/show_bug.cgi?id=1553012

https://bugzilla.redhat.com/show_bug.cgi?id=1553035

https://bugzilla.redhat.com/show_bug.cgi?id=1553294

https://bugzilla.redhat.com/show_bug.cgi?id=1554141

Plugin Details

Severity: Critical

ID: 119401

File Name: redhat-RHSA-2018-2013.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/4/2018

Updated: 4/27/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-1085

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-descheduler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-docker-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-federation-services, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node-problem-detector, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:golang-github-prometheus-node_exporter, p-cpe:/a:redhat:enterprise_linux:mysql-apb-role, p-cpe:/a:redhat:enterprise_linux:openshift-ansible, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-docs, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-playbooks, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-roles, p-cpe:/a:redhat:enterprise_linux:prometheus-node-exporter, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-catalog, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-template-service-broker, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-utils, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-web-console

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 6/27/2018

Vulnerability Publication Date: 6/12/2018

Reference Information

CVE: CVE-2018-1070, CVE-2018-10843, CVE-2018-1085

CWE: 20, 287

RHSA: 2018:2013