言語:
https://alas.aws.amazon.com/cve/html/CVE-2022-0778.html
https://alas.aws.amazon.com/cve/html/CVE-2021-35604.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46669.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46659.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46661.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46663.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46664.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46665.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46667.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46668.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24048.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24050.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24051.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24052.html
https://alas.aws.amazon.com/cve/html/CVE-2021-2372.html
https://alas.aws.amazon.com/cve/html/CVE-2021-2389.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46658.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46662.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27376.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27377.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27378.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27379.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27380.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27381.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27382.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27383.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27384.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27385.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27386.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27387.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27444.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27445.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27446.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27447.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27448.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27449.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27451.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27452.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27455.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27456.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27457.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27458.html
https://alas.aws.amazon.com/cve/html/CVE-2022-31624.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32083.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32085.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32086.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32087.html
深刻度: High
ID: 167033
ファイル名: al2022_ALAS2022-2022-182.nasl
バージョン: 1.3
タイプ: local
エージェント: unix
公開日: 2022/11/5
更新日: 2022/11/7
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment
リスクファクター: Medium
スコア: 6.7
リスクファクター: Medium
Base Score: 5.5
Temporal Score: 4.3
ベクトル: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P
現状ベクトル: CVSS2#E:POC/RL:OF/RC:C
CVSS スコアのソース: CVE-2021-35604
リスクファクター: High
Base Score: 7.8
Temporal Score: 7
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CVSS スコアのソース: CVE-2022-24052
CPE: cpe:2.3:o:amazon:linux:2022:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-backup:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-backup-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-common:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-connect-engine:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-connect-engine-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-cracklib-password-check:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-cracklib-password-check-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-errmsg:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-gssapi-server:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-gssapi-server-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-oqgraph-engine:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-oqgraph-engine-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-pam:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-pam-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-rocksdb-engine:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-rocksdb-engine-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-server:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-server-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-server-utils:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-server-utils-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-sphinx-engine:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-sphinx-engine-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-test:*:*:*:*:*:*:*, p-cpe:2.3:a:amazon:linux:mariadb105-test-debuginfo:*:*:*:*:*:*:*
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/11/1
脆弱性公開日: 2021/7/20
CVE: CVE-2021-2372, CVE-2021-2389, CVE-2021-35604, CVE-2021-46659, CVE-2021-46658, CVE-2021-46661, CVE-2021-46662, CVE-2021-46663, CVE-2021-46664, CVE-2021-46668, CVE-2021-46669, CVE-2021-46667, CVE-2021-46665, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-0778, CVE-2022-27379, CVE-2022-27380, CVE-2022-27383, CVE-2022-27382, CVE-2022-27385, CVE-2022-27376, CVE-2022-27384, CVE-2022-27387, CVE-2022-27381, CVE-2022-27378, CVE-2022-27386, CVE-2022-27377, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-27458, CVE-2022-31624, CVE-2022-32083, CVE-2022-32085, CVE-2022-32086, CVE-2022-32087, CVE-2022-32088