Amazon Linux AMI : collectd (ALAS-2017-829)

high Nessus Plugin ID 100274

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions :

Collectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with 'SecurityLevel None' and with empty 'AuthFile' options an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service.
(CVE-2017-7401)

Solution

Run 'yum update collectd' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2017-829.html

Plugin Details

Severity: High

ID: 100274

File Name: ala_ALAS-2017-829.nasl

Version: 3.3

Type: local

Agent: unix

Published: 5/19/2017

Updated: 4/18/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:collectd-iptables, p-cpe:/a:amazon:linux:collectd-ipvs, p-cpe:/a:amazon:linux:collectd-java, p-cpe:/a:amazon:linux:collectd-lua, p-cpe:/a:amazon:linux:collectd-lvm, p-cpe:/a:amazon:linux:collectd-memcachec, p-cpe:/a:amazon:linux:collectd-mysql, p-cpe:/a:amazon:linux:collectd-netlink, p-cpe:/a:amazon:linux:collectd-nginx, p-cpe:/a:amazon:linux:collectd-notify_email, p-cpe:/a:amazon:linux:collectd-openldap, p-cpe:/a:amazon:linux:collectd-postgresql, p-cpe:/a:amazon:linux:collectd-python, p-cpe:/a:amazon:linux:collectd-rrdcached, p-cpe:/a:amazon:linux:collectd, p-cpe:/a:amazon:linux:collectd-amqp, p-cpe:/a:amazon:linux:collectd-apache, p-cpe:/a:amazon:linux:collectd-bind, p-cpe:/a:amazon:linux:collectd-chrony, p-cpe:/a:amazon:linux:collectd-curl, p-cpe:/a:amazon:linux:collectd-curl_xml, p-cpe:/a:amazon:linux:collectd-dbi, p-cpe:/a:amazon:linux:collectd-debuginfo, p-cpe:/a:amazon:linux:collectd-dns, p-cpe:/a:amazon:linux:collectd-drbd, p-cpe:/a:amazon:linux:collectd-email, p-cpe:/a:amazon:linux:collectd-generic-jmx, p-cpe:/a:amazon:linux:collectd-gmond, p-cpe:/a:amazon:linux:collectd-hugepages, p-cpe:/a:amazon:linux:collectd-ipmi, p-cpe:/a:amazon:linux:collectd-rrdtool, p-cpe:/a:amazon:linux:collectd-snmp, p-cpe:/a:amazon:linux:collectd-utils, p-cpe:/a:amazon:linux:collectd-varnish, p-cpe:/a:amazon:linux:collectd-web, p-cpe:/a:amazon:linux:collectd-write_http, p-cpe:/a:amazon:linux:collectd-write_sensu, p-cpe:/a:amazon:linux:collectd-write_tsdb, p-cpe:/a:amazon:linux:collectd-zookeeper, p-cpe:/a:amazon:linux:libcollectdclient, p-cpe:/a:amazon:linux:libcollectdclient-devel, p-cpe:/a:amazon:linux:perl-collectd, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 5/18/2017

Reference Information

CVE: CVE-2017-7401

ALAS: 2017-829