Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004963
https://security-tracker.debian.org/tracker/source-package/libde265
https://www.debian.org/security/2023/dsa-5346
https://security-tracker.debian.org/tracker/CVE-2020-21594
https://security-tracker.debian.org/tracker/CVE-2020-21595
https://security-tracker.debian.org/tracker/CVE-2020-21596
https://security-tracker.debian.org/tracker/CVE-2020-21597
https://security-tracker.debian.org/tracker/CVE-2020-21598
https://security-tracker.debian.org/tracker/CVE-2020-21599
https://security-tracker.debian.org/tracker/CVE-2020-21600
https://security-tracker.debian.org/tracker/CVE-2020-21601
https://security-tracker.debian.org/tracker/CVE-2020-21602
https://security-tracker.debian.org/tracker/CVE-2020-21603
https://security-tracker.debian.org/tracker/CVE-2020-21604
https://security-tracker.debian.org/tracker/CVE-2020-21605
https://security-tracker.debian.org/tracker/CVE-2020-21606
https://security-tracker.debian.org/tracker/CVE-2021-35452
https://security-tracker.debian.org/tracker/CVE-2021-36408
https://security-tracker.debian.org/tracker/CVE-2021-36409
https://security-tracker.debian.org/tracker/CVE-2021-36410
https://security-tracker.debian.org/tracker/CVE-2021-36411
https://security-tracker.debian.org/tracker/CVE-2022-1253
https://security-tracker.debian.org/tracker/CVE-2022-43235
https://security-tracker.debian.org/tracker/CVE-2022-43236
https://security-tracker.debian.org/tracker/CVE-2022-43237
https://security-tracker.debian.org/tracker/CVE-2022-43238
https://security-tracker.debian.org/tracker/CVE-2022-43239
https://security-tracker.debian.org/tracker/CVE-2022-43240
https://security-tracker.debian.org/tracker/CVE-2022-43241
https://security-tracker.debian.org/tracker/CVE-2022-43242
https://security-tracker.debian.org/tracker/CVE-2022-43243
https://security-tracker.debian.org/tracker/CVE-2022-43244
https://security-tracker.debian.org/tracker/CVE-2022-43245
https://security-tracker.debian.org/tracker/CVE-2022-43248
https://security-tracker.debian.org/tracker/CVE-2022-43249
https://security-tracker.debian.org/tracker/CVE-2022-43250
https://security-tracker.debian.org/tracker/CVE-2022-43252
https://security-tracker.debian.org/tracker/CVE-2022-43253
深刻度: Critical
ID: 171376
ファイル名: debian_DSA-5346.nasl
バージョン: 1.1
タイプ: local
エージェント: unix
ファミリー: Debian Local Security Checks
公開日: 2023/2/11
更新日: 2023/9/4
サポートされているセンサー: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment
リスクファクター: Medium
スコア: 6.7
リスクファクター: High
Base Score: 7.5
Temporal Score: 5.9
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS スコアのソース: CVE-2022-1253
リスクファクター: Critical
Base Score: 9.8
Temporal Score: 8.8
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libde265-0, p-cpe:/a:debian:debian_linux:libde265-dev, p-cpe:/a:debian:debian_linux:libde265-examples, cpe:/o:debian:debian_linux:11.0
必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2023/2/10
脆弱性公開日: 2021/9/16
CVE: CVE-2020-21594, CVE-2020-21595, CVE-2020-21596, CVE-2020-21597, CVE-2020-21598, CVE-2020-21599, CVE-2020-21600, CVE-2020-21601, CVE-2020-21602, CVE-2020-21603, CVE-2020-21604, CVE-2020-21605, CVE-2020-21606, CVE-2021-35452, CVE-2021-36408, CVE-2021-36409, CVE-2021-36410, CVE-2021-36411, CVE-2022-1253, CVE-2022-43235, CVE-2022-43236, CVE-2022-43237, CVE-2022-43238, CVE-2022-43239, CVE-2022-43240, CVE-2022-43241, CVE-2022-43242, CVE-2022-43243, CVE-2022-43244, CVE-2022-43245, CVE-2022-43248, CVE-2022-43249, CVE-2022-43250, CVE-2022-43252, CVE-2022-43253, CVE-2022-47655