OS vulnerabilities detected in banner reporting (PCI-DSS check)

high Nessus Plugin ID 108591

Synopsis

The OS version reported in banners possesses one or more vulnerabilities.

Description

A service banner response from the remote host indicates an OS install at a level that may be vulnerable to one or more vulnerabilities.

This plugin only runs when 'Check for PCI-DSS compliance' is enabled in the scan policy. It does not run if local security checks are enabled. It runs off of self-reported OS versions in banners and fingerprinting.

Solution

Update the version of the OS running on the system.

See Also

https://bodhi.fedoraproject.org/updates/

https://lists.centos.org/pipermail/centos-announce/

https://lists.vmware.com/pipermail/security-announce/

https://usn.ubuntu.com/

https://www.vuxml.org/freebsd/

Plugin Details

Severity: High

ID: 108591

File Name: os_banner_potential_vulnerabilities.nasl

Version: 1.4

Type: remote

Family: Web Servers

Published: 3/23/2018

Updated: 4/22/2020

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score from an in depth analysis done by tenable

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Vulnerability Information

Required KB Items: Settings/PCI_DSS

Excluded KB Items: Host/local_checks_enabled