跳转到帖子

Red Hat: CVE-2023-38201: challenge-response protocol bypass during agent registration (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-38201: challenge-response protocol bypass during agent registration (Multiple Advisories)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:N/I:C/A:N)
Published
08/25/2023
Created
09/13/2023
Added
09/13/2023
Modified
01/28/2025

Description

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

Solution(s)

  • redhat-upgrade-keylime
  • redhat-upgrade-keylime-base
  • redhat-upgrade-keylime-registrar
  • redhat-upgrade-keylime-selinux
  • redhat-upgrade-keylime-tenant
  • redhat-upgrade-keylime-verifier
  • redhat-upgrade-python3-keylime

References

  • CVE-2023-38201
  • RHSA-2023:5080
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…