Amazon Linux AMI : libgcrypt / gnupg (ALAS-2016-744)

medium Nessus Plugin ID 93536

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker who can obtain the first 580 bytes of the PRNG output can trivially predict the following 20 bytes.

Solution

Run 'yum update libgcrypt' to update your system.

Run 'yum update gnupg' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2016-744.html

Plugin Details

Severity: Medium

ID: 93536

File Name: ala_ALAS-2016-744.nasl

Version: 2.3

Type: local

Agent: unix

Published: 9/16/2016

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:gnupg-debuginfo, p-cpe:/a:amazon:linux:libgcrypt, p-cpe:/a:amazon:linux:libgcrypt-devel, p-cpe:/a:amazon:linux:libgcrypt-debuginfo, p-cpe:/a:amazon:linux:gnupg, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 9/15/2016

Reference Information

CVE: CVE-2016-6313

ALAS: 2016-744