Language:
https://bugzilla.suse.com/show_bug.cgi?id=1020950
https://bugzilla.suse.com/show_bug.cgi?id=1024749
https://bugzilla.suse.com/show_bug.cgi?id=1045460
https://bugzilla.suse.com/show_bug.cgi?id=1050469
https://www.suse.com/security/cve/CVE-2016-7586/
https://www.suse.com/security/cve/CVE-2016-7589/
https://www.suse.com/security/cve/CVE-2016-7592/
https://www.suse.com/security/cve/CVE-2016-7599/
https://www.suse.com/security/cve/CVE-2016-7623/
https://www.suse.com/security/cve/CVE-2016-7632/
https://www.suse.com/security/cve/CVE-2016-7635/
https://www.suse.com/security/cve/CVE-2016-7639/
https://www.suse.com/security/cve/CVE-2016-7641/
https://www.suse.com/security/cve/CVE-2016-7645/
https://www.suse.com/security/cve/CVE-2016-7652/
https://www.suse.com/security/cve/CVE-2016-7654/
https://www.suse.com/security/cve/CVE-2016-7656/
https://www.suse.com/security/cve/CVE-2017-2350/
https://www.suse.com/security/cve/CVE-2017-2354/
https://www.suse.com/security/cve/CVE-2017-2355/
https://www.suse.com/security/cve/CVE-2017-2356/
https://www.suse.com/security/cve/CVE-2017-2362/
https://www.suse.com/security/cve/CVE-2017-2363/
https://www.suse.com/security/cve/CVE-2017-2364/
https://www.suse.com/security/cve/CVE-2017-2365/
https://www.suse.com/security/cve/CVE-2017-2366/
https://www.suse.com/security/cve/CVE-2017-2369/
https://www.suse.com/security/cve/CVE-2017-2371/
https://www.suse.com/security/cve/CVE-2017-2373/
https://www.suse.com/security/cve/CVE-2017-2496/
https://www.suse.com/security/cve/CVE-2017-2510/
https://www.suse.com/security/cve/CVE-2017-2538/
https://www.suse.com/security/cve/CVE-2017-2539/
https://www.suse.com/security/cve/CVE-2017-7018/
https://www.suse.com/security/cve/CVE-2017-7030/
https://www.suse.com/security/cve/CVE-2017-7034/
https://www.suse.com/security/cve/CVE-2017-7037/
https://www.suse.com/security/cve/CVE-2017-7039/
https://www.suse.com/security/cve/CVE-2017-7046/
https://www.suse.com/security/cve/CVE-2017-7048/
https://www.suse.com/security/cve/CVE-2017-7055/
https://www.suse.com/security/cve/CVE-2017-7056/
https://www.suse.com/security/cve/CVE-2017-7061/
深刻度: High
ID: 104428
ファイル名: suse_SU-2017-2933-1.nasl
バージョン: 3.8
タイプ: local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2017/11/7
更新日: 2021/1/6
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: Medium
基本値: 6.8
現状値: 5.3
ベクトル: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
リスクファクター: High
基本値: 8.8
現状値: 7.9
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0, p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18-debuginfo, p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0, p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37-debuginfo, p-cpe:/a:novell:suse_linux:typelib-1_0-javascriptcore, p-cpe:/a:novell:suse_linux:typelib-1_0-webkit2, p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles, p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles-debuginfo, p-cpe:/a:novell:suse_linux:webkit2gtk3-debugsource, cpe:/o:novell:suse_linux:12
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2017/11/6
脆弱性公開日: 2017/2/20
CVE: CVE-2016-7586, CVE-2016-7589, CVE-2016-7592, CVE-2016-7599, CVE-2016-7623, CVE-2016-7632, CVE-2016-7635, CVE-2016-7639, CVE-2016-7641, CVE-2016-7645, CVE-2016-7652, CVE-2016-7654, CVE-2016-7656, CVE-2017-2350, CVE-2017-2354, CVE-2017-2355, CVE-2017-2356, CVE-2017-2362, CVE-2017-2363, CVE-2017-2364, CVE-2017-2365, CVE-2017-2366, CVE-2017-2369, CVE-2017-2371, CVE-2017-2373, CVE-2017-2496, CVE-2017-2510, CVE-2017-2538, CVE-2017-2539, CVE-2017-7018, CVE-2017-7030, CVE-2017-7034, CVE-2017-7037, CVE-2017-7039, CVE-2017-7046, CVE-2017-7048, CVE-2017-7055, CVE-2017-7056, CVE-2017-7061, CVE-2017-7064