We are trying to pass a PCI compliance scan through TrustWave on a BlueOnyx 5208R VPS (SL version) running on Aventurin{e}. They are complaining about the version of OpenSSH on the box. Of the 9 complaints they have, I believe I've found documentation proving that the openssh-5.3p1-122.el6 version that we run is sufficiently patched to fix those issues or that those issues don't apply to our version -- all except for one issue.

Has anyone gone through this or know enough about it to give me a hint on CVE-2016-10012? (https://access.redhat.com/security/cve/CVE-2016-10012, https://nvd.nist.gov/vuln/detail/CVE-2016-10012)? From poking around, it sounds like Red Hat is saying that they don't have plans to fix this one because they see it as a lower priority item because your server would first have to be compromised through some other method before an attacker even being able to get to the point of exploiting this vulnerability. I don't think that explanation will fly with Trustwave, so we would not get a passing status. Does anyone know more about this issue and a way to get through a scan or a successful way to challenge this finding?

Going out on a limb, is there a remote chance of getting openssh 7.4 on this server that is still running 5208R, or would the only way to get to that version be doing a full update to 5209R? I'm trying to avoid that.

-jim
_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to