Overview You may notice that you cannot establish connections to the database. One or more of the following symptoms may be observed: When you run ndb_mgm -e show, the database appears as not connecte...
Overview Your company may have a team dedicated to identifying and fixing security issues (e.g., network security group). They might have detected OS vulnerabilities and need a remediation plan. Inf...
Overview During security scans, one of the security vulnerabilities that can be found is deprecated SSH cryptographic settings. The SSH protocol (Secure Shell) is a method for securing remote login fr...
Overview One of the security vulnerabilities that security scans can detect is a remote management service accepting unencrypted credentials, such as FTP. That happens when services that use basic aut...
Overview Security scans might identify the NTP monlist feature denial of service vulnerability. The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to anothe...
Overview One possible security vulnerability reported in security scans is Sudo Heap-based Buffer Overflow Vulnerability (Baron Samedit) (Generic). sudo is a program for Unix-like computer operating s...
Overview A security scan might report the OpenSSH command injection vulnerability (Generic). Solution No solution is available from Linux vendors yet. This issue is marked as Will not fix by Red Hat...
Overview A security scan might report the following issue: EOL/Obsolete Operating System: Red Hat Enterprise Linux 6.x Detected. Solution Support for Red Hat Enterprise Linux 6 ended on November 30,...
Overview A security scan might report Service Stopped Responding. Information The Service Stopped Responding issue might happen with a port that CCI uses to query the AMS Database. It could be busy ...
Overview Security scans might report Red Hat Libxml2 Arbitrary Code Execution Vulnerability. Information The libxml2 library is a development toolbox providing the implementation of various XML stan...