Nessus Vulnerability Plugin ID 12218 and 10677 in RHN Satellite Server
Issue
- Satellite server system have been flagged for these two vulnerabilities Nessus Vulnerability Plugin ID 12218 and 10677.
- ID 12218 states: "The remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which allows anyone to uncover information from the remote host such as its operating system type and exact version, its hostname, and the list of services it is running."
- ID 10677 states: "It is possible to obtain an overview of the remote Apache web server's activity and performance by requesting the URL '/server-status'. This overview includes information such as current hosts and requests being processed, the number of workers idle and service requests, and CPU utilization.
Environment
- Red Hat Enterprise Linux
- Red Hat Network Satellite
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.