Website Analysis: How can CVE bugs be fixed?
I have a website, and an analysis was performed. Here are the results, which I can't interpret ("my-website" in mail.my-website.net is a placeholder):
– Problem:
— Finding: Detected CVEs for ISC BIND 9.11.4 with CVSS above 7.0
— Asset: mail.my-website.net
— Description: The detected technology has CVEs with a CVSS score higher than 7.0. It should be prioritized for patching, and addressed as part of the evaluation of Vulnerabilities and Risk Management policies.
– Problem:
— Finding: Detected CVEs for OpenSSH 7.4 with CVSS above 7.0
— Asset: mail.my-website.net
— Description: The detected technology has CVEs with a CVSS score higher than 7.0. It should be prioritized for patching, and addressed as part of the evaluation of Vulnerabilities and Risk Management policies.
– Problem:
— Finding: Detected CVEs for Exim 4.95 with CVSS above 7.0
— Asset: mail.my-website.net
— Description: The detected technology has CVEs with a CVSS score higher than 7.0. It should be prioritized for patching, and addressed as part of the evaluation of Vulnerabilities and Risk Management policies.
– Problem:
— Finding: Detected CVEs for MySQL 5.7.23 with CVSS above 7.0
— Asset: mail.my-website.net
— Description: The detected technology has CVEs with a CVSS score higher than 7.0. It should be prioritized for patching, and addressed as part of the evaluation of Vulnerabilities and Risk Management policies.
What exactly do I need to do to fix the problems?
In which the software is updated, that’s all. Whatever it’s running for a mail set on it is outdated
First you should know what’s behind mail.deine-website.net. Software from you? Anything from the hosting provider?
This uses software with known vulnerabilities. If you check if this is true what the scanner says and then update if possible.
PS: If the version numbers are correct, the system is not upgraded forever. OpenSSH 7.4 is from 2017.
You should update your software. Do you run the server yourself?