top of page
Search

PCI

  • knowledgediary4min
  • Mar 3, 2020
  • 3 min read

Disable TLSv1

--------------------

Apache, Exim, Mail and FTP

All -SSLv2 -SSLv3 -TLSv1

Weak or Medium Strength Cipher Suites Supported and SSL 64-bit Block Size Cipher Suites Supported (SWEET32)

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

For SSL Weak or Medium Strength Cipher Suites Supported and SSL 64-bit Block Size Cipher Suites Supported (SWEET32) we need to disable 3DES algorithm in the configuration file using !3DES(some sample ones can be seen in hybrid19,SSD166sql etc).

ssh -Q kex

https://www.ssh.com/ssh/sshd_config/

https://access.redhat.com/discussions/2143791

https://security.stackexchange.com/questions/29262/disabling-authentication-via-dsa-keys-in-openssh

>> CVE-2015-5600

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2015-5600

- CVE-2015-5600: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices

>> OpenSSH user enumeration based on SHA256 / SHA512 vs Blowfish hashing time difference, CVE-2016-6210

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2016-6210

- Fix for CVE-2016-6210: User enumeration via covert timing channel (#1357442)

>> OpenSSH X11 Security Bypass Vulnerability (OpenSSH 7.2 Release), CVE-2016-1908

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2016-1908

- CVE-2016-1908: Prevent possible fallback from untrusted X11 forwarding (#1299048)

>> OpenSSH Portable (non-OpenBSD) Remote Code Execution and Privilege Escalation by use-after-free bug in pre-auth process, CVE-2015-6564

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2015-6564

- CVE-2015-6564: Use-after-free bug related to PAM support

>> OpenSSH SSHFP DNS resource record look up bypass in the client, CVE-2014-2653

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2014-2653

- prevent a server from skipping SSHFP lookup (#1081338) CVE-2014-2653

>> OpenSSH Wildcards on AcceptEnv VVulnerability , CVE-2014-2532

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2014-2532

- ignore environment variables with embedded '=' or '\0' characters CVE-2014-2532

>> X11 forwarding data allows multiple CRLF injection in OpenSSH before 7.2p2, CVE-2016-3115

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2016-3115

- CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317817)

>> OpenSSH through 7.2p2 allows potential privilege escalation by remote attackers, CVE-2015-8325

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2015-8325

- CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (1405374)

>> OpenSSH before 6.9, when ForwardX11Trusted mode is not used lacks proper access

root@uniform [~]# rpm -q --changelog openssh | grep CVE-2015-5352

- CVE-2015-5352: XSECURITY restrictions bypass under certain conditions

Further I can confirm that upgrade is right now not available for Openssh. The server is on the latest supported OpenSSH version. We will upgrade once we have the upgrade available.

>> Local privilege escalation in OpenSSH before 7.4 when sshd runs with root privileges (related to serverloop.c), CVE-2016-10010

This vulnerability does not affect the version OpenSSH as shipped with Red Hat Enterprise Linux 6. Please confirm it from the link https://access.redhat.com/security/cve/cve-2016-10010

root@uniform [~]# cat /etc/redhat-release

CentOS release 6.8 (Final)

>> Remote Access Service Detected

Your domain is right now hosted in a shared environment and hence the SSH access to the server cannot be restricted. This is required for bussiness and cannot set up restirction.

This is the SSH port of the server. As it's a shared hosting environment, we're unfortunately, not able to IP restrict this one. If you process card payments on your website, this shouldn't be on a shared hosting server. You should be on a dedicated box of your own, where you can restrict the IP addresses from which SSH (port 2223) is accessed. If you don't process card details on your website, you can let the PCI agency know this, and they should provide you with an exclusion for the same.

>> OpenSSH sshd User Enumeration Vulnerability, CVE-2018-15473

As mentioned earlier, your site is in SSH access to the server cannot be restricted. This vulnerability is mostly explained in the case of public_key authentication method.

>> OpenSSH allows for the transmission of the entire buffer to remote servers before 7.1p2, CVE-2016-0777

This issue does not affect the version OpenSSH as shipped with Red Hat Enterprise Linux 4, 5 and 6. Please check the link https://access.redhat.com/security/cve/cve-2016-0777

root@uniform [~]# cat /etc/redhat-release

CentOS release 6.8 (Final)

 
 
 

Recent Posts

See All
clear script

#!/bin/bash rm -f ./cleanspace.sh bold=$(tput bold) normal=$(tput sgr0) TIMESTAMP=$(date +%d-%m-%Y-%H-%M) LOGFILE="/root/cleardisk-$TIME...

 
 
 
innodb restore

Create a new folder: mkdir /var/lib/mysql2 From R1: Restore from the /var/lib/mysql folder: + The folder which is called the db name...

 
 
 
Scripts

#not wordpress site grep shop2vizag.com /var/log/messages | awk '{print $6}' | cut -d: -f1 |sort -n |uniq -c |sort -n #Domains using...

 
 
 

Comments


  • White Facebook Icon
  • White Twitter Icon
  • White Instagram Icon
  • White YouTube Icon

© 2023 by Knowledge4mind. Proudly created with Wix.com

bottom of page