The system is missing one or more SuSE security patches. Security Update: This update resolves a heap corruption bug in the RSA authentication code of cfservd which can be exploited remotely to execute arbitrary code as root. Another bug leads to a remotely triggerable crash of the gfservd to deny service. For a successful attack the attacker has to bypass the IP Access Control Lists (ACL). Note: This is the second update for cfengine, it fixes locking problems introduced with the first one.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center