Kernel vulnerabilities detected in banner reporting (PCI-DSS check)

high Nessus Plugin ID 108590

Synopsis

The Linux kernel version reported in banners possesses one or more vulnerabilities.

Description

A service banner response from the remote host indicates a Linux kernel install at a level that may be vulnerable to one or more non-denial-of-service vulnerabilities.

This plugin only runs when 'Check for PCI-DSS compliance' is enabled in the scan policy. It does not run if local security checks are enabled. It runs off of self-reported kernel versions in banners.

Solution

Update the version of the Linux kernel running on the system.

See Also

http://www.nessus.org/u?52b202ee

Plugin Details

Severity: High

ID: 108590

File Name: kernel_banner_potential_vulnerabilities.nasl

Version: 1.3

Type: remote

Family: Web Servers

Published: 3/23/2018

Updated: 4/22/2020

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score from an in depth analysis done by tenable

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Vulnerability Information

Required KB Items: Settings/PCI_DSS

Excluded KB Items: Host/local_checks_enabled