语言:
https://access.redhat.com/security/cve/CVE-2019-8625
https://access.redhat.com/security/cve/CVE-2019-8710
https://access.redhat.com/security/cve/CVE-2019-8720
https://access.redhat.com/security/cve/CVE-2019-8743
https://access.redhat.com/security/cve/CVE-2019-8764
https://access.redhat.com/security/cve/CVE-2019-8766
https://access.redhat.com/security/cve/CVE-2019-8769
https://access.redhat.com/security/cve/CVE-2019-8771
https://access.redhat.com/security/cve/CVE-2019-8782
https://access.redhat.com/security/cve/CVE-2019-8783
https://access.redhat.com/security/cve/CVE-2019-8808
https://access.redhat.com/security/cve/CVE-2019-8811
https://access.redhat.com/security/cve/CVE-2019-8812
https://access.redhat.com/security/cve/CVE-2019-8813
https://access.redhat.com/security/cve/CVE-2019-8814
https://access.redhat.com/security/cve/CVE-2019-8815
https://access.redhat.com/security/cve/CVE-2019-8816
https://access.redhat.com/security/cve/CVE-2019-8819
https://access.redhat.com/security/cve/CVE-2019-8820
https://access.redhat.com/security/cve/CVE-2019-8823
https://access.redhat.com/security/cve/CVE-2019-8835
https://access.redhat.com/security/cve/CVE-2019-8844
https://access.redhat.com/security/cve/CVE-2019-8846
https://access.redhat.com/security/cve/CVE-2020-3862
https://access.redhat.com/security/cve/CVE-2020-3864
https://access.redhat.com/security/cve/CVE-2020-3865
https://access.redhat.com/security/cve/CVE-2020-3867
https://access.redhat.com/security/cve/CVE-2020-3868
https://access.redhat.com/security/cve/CVE-2020-3885
https://access.redhat.com/security/cve/CVE-2020-3894
https://access.redhat.com/security/cve/CVE-2020-3895
https://access.redhat.com/security/cve/CVE-2020-3897
https://access.redhat.com/security/cve/CVE-2020-3899
https://access.redhat.com/security/cve/CVE-2020-3900
https://access.redhat.com/security/cve/CVE-2020-3901
https://access.redhat.com/security/cve/CVE-2020-3902
https://access.redhat.com/security/cve/CVE-2020-9802
https://access.redhat.com/security/cve/CVE-2020-9803
https://access.redhat.com/security/cve/CVE-2020-9805
https://access.redhat.com/security/cve/CVE-2020-9806
https://access.redhat.com/security/cve/CVE-2020-9807
https://access.redhat.com/security/cve/CVE-2020-9843
https://access.redhat.com/security/cve/CVE-2020-9850
https://access.redhat.com/security/cve/CVE-2020-9862
https://access.redhat.com/security/cve/CVE-2020-9893
https://access.redhat.com/security/cve/CVE-2020-9894
https://access.redhat.com/security/cve/CVE-2020-9895
https://access.redhat.com/security/cve/CVE-2020-9915
https://access.redhat.com/security/cve/CVE-2020-9925
https://access.redhat.com/security/cve/CVE-2020-9952
https://access.redhat.com/security/cve/CVE-2020-10018
https://access.redhat.com/security/cve/CVE-2020-11793
https://access.redhat.com/security/cve/CVE-2020-14391
https://access.redhat.com/security/cve/CVE-2020-15503
https://access.redhat.com/security/cve/CVE-2021-30666
https://access.redhat.com/security/cve/CVE-2021-30761
https://access.redhat.com/security/cve/CVE-2021-30762
https://access.redhat.com/errata/RHSA-2020:4451
https://bugzilla.redhat.com/1811721
https://bugzilla.redhat.com/1816678
https://bugzilla.redhat.com/1816684
https://bugzilla.redhat.com/1816686
https://bugzilla.redhat.com/1829369
https://bugzilla.redhat.com/1853477
https://bugzilla.redhat.com/1873093
https://bugzilla.redhat.com/1876462
https://bugzilla.redhat.com/1876463
https://bugzilla.redhat.com/1876465
https://bugzilla.redhat.com/1876468
https://bugzilla.redhat.com/1876470
https://bugzilla.redhat.com/1876472
https://bugzilla.redhat.com/1876473
https://bugzilla.redhat.com/1876476
https://bugzilla.redhat.com/1876516
https://bugzilla.redhat.com/1876518
https://bugzilla.redhat.com/1876521
https://bugzilla.redhat.com/1876522
https://bugzilla.redhat.com/1876523
https://bugzilla.redhat.com/1876536
https://bugzilla.redhat.com/1876537
https://bugzilla.redhat.com/1876540
https://bugzilla.redhat.com/1876543
https://bugzilla.redhat.com/1876545
https://bugzilla.redhat.com/1876548
https://bugzilla.redhat.com/1876549
https://bugzilla.redhat.com/1876550
https://bugzilla.redhat.com/1876552
https://bugzilla.redhat.com/1876553
https://bugzilla.redhat.com/1876554
https://bugzilla.redhat.com/1876555
https://bugzilla.redhat.com/1876556
https://bugzilla.redhat.com/1876590
https://bugzilla.redhat.com/1876591
https://bugzilla.redhat.com/1876594
https://bugzilla.redhat.com/1876607
https://bugzilla.redhat.com/1876611
https://bugzilla.redhat.com/1876617
https://bugzilla.redhat.com/1876619
https://bugzilla.redhat.com/1879532
https://bugzilla.redhat.com/1879535
https://bugzilla.redhat.com/1879536
https://bugzilla.redhat.com/1879538
https://bugzilla.redhat.com/1879540
https://bugzilla.redhat.com/1879541
https://bugzilla.redhat.com/1879545
https://bugzilla.redhat.com/1879557
https://bugzilla.redhat.com/1879559
https://bugzilla.redhat.com/1879563
https://bugzilla.redhat.com/1879564
https://bugzilla.redhat.com/1879566
https://bugzilla.redhat.com/1879568
https://bugzilla.redhat.com/1901219
https://bugzilla.redhat.com/1986877
严重性: Critical
ID: 142418
文件名: redhat-RHSA-2020-4451.nasl
版本: 1.12
类型: local
代理: unix
发布时间: 2020/11/4
最近更新时间: 2023/5/25
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: High
分数: 8.9
风险因素: High
基本分数: 9.3
时间分数: 8.1
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2020-3899
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2020-9895
CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.4, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.4, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.4, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.4, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:libraw, p-cpe:/a:redhat:enterprise_linux:libraw-devel, p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon, p-cpe:/a:redhat:enterprise_linux:webkit2gtk3, p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-devel, p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-jsc, p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-jsc-devel
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2020/11/4
漏洞发布日期: 2019/9/23
CISA 已知可遭利用的漏洞到期日期: 2022/6/13
Metasploit (Safari in Operator Side Effect Exploit)
CVE: CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-10018, CVE-2020-11793, CVE-2020-14391, CVE-2020-15503, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925