语言:
https://access.redhat.com/errata/RHSA-2024:2720
https://access.redhat.com/security/cve/CVE-2021-25220
https://access.redhat.com/security/cve/CVE-2022-2795
https://access.redhat.com/security/cve/CVE-2022-3094
https://access.redhat.com/security/cve/CVE-2023-4408
严重性: Medium
ID: 195112
文件名: redhat-RHSA-2024-2720.nasl
版本: 1.1
类型: local
代理: unix
发布时间: 2024/5/7
最近更新时间: 2024/5/10
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: Medium
分数: 5.2
风险因素: Medium
基本分数: 4
时间分数: 3
矢量: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS 分数来源: CVE-2021-25220
风险因素: Medium
基本分数: 6.8
时间分数: 5.9
矢量: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
时间矢量: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:bind, p-cpe:/a:redhat:enterprise_linux:bind-chroot, p-cpe:/a:redhat:enterprise_linux:bind-devel, p-cpe:/a:redhat:enterprise_linux:bind-export-devel, p-cpe:/a:redhat:enterprise_linux:bind-export-libs, p-cpe:/a:redhat:enterprise_linux:bind-libs, p-cpe:/a:redhat:enterprise_linux:bind-libs-lite, p-cpe:/a:redhat:enterprise_linux:bind-license, p-cpe:/a:redhat:enterprise_linux:bind-lite-devel, p-cpe:/a:redhat:enterprise_linux:bind-pkcs11, p-cpe:/a:redhat:enterprise_linux:bind-pkcs11-devel, p-cpe:/a:redhat:enterprise_linux:bind-pkcs11-libs, p-cpe:/a:redhat:enterprise_linux:bind-pkcs11-utils, p-cpe:/a:redhat:enterprise_linux:bind-sdb, p-cpe:/a:redhat:enterprise_linux:bind-sdb-chroot, p-cpe:/a:redhat:enterprise_linux:bind-utils, p-cpe:/a:redhat:enterprise_linux:dhcp-client, p-cpe:/a:redhat:enterprise_linux:dhcp-common, p-cpe:/a:redhat:enterprise_linux:dhcp-libs, p-cpe:/a:redhat:enterprise_linux:dhcp-relay, p-cpe:/a:redhat:enterprise_linux:dhcp-server, p-cpe:/a:redhat:enterprise_linux:python3-bind
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
易利用性: No known exploits are available
补丁发布日期: 2024/5/7
漏洞发布日期: 2022/3/16
CVE: CVE-2021-25220, CVE-2022-2795, CVE-2022-3094, CVE-2023-4408, CVE-2023-50387, CVE-2023-50868