Language:
http://www.nessus.org/u?b825593d
https://access.redhat.com/errata/RHSA-2012:0019
https://access.redhat.com/security/updates/classification/#moderate
深刻度: High
ID: 57494
ファイル名: redhat-RHSA-2012-0019.nasl
バージョン: 1.30
タイプ: local
エージェント: unix
公開日: 2012/1/12
更新日: 2025/3/24
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.0
Vendor Severity: Moderate
リスクファクター: Medium
基本値: 6.4
現状値: 5.6
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS スコアのソース: CVE-2011-4566
リスクファクター: High
基本値: 7.5
現状値: 7.2
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CVSS スコアのソース: CVE-2011-4885
CPE: p-cpe:/a:redhat:enterprise_linux:php-pspell, p-cpe:/a:redhat:enterprise_linux:php53-ldap, p-cpe:/a:redhat:enterprise_linux:php-zts, p-cpe:/a:redhat:enterprise_linux:php53-pspell, p-cpe:/a:redhat:enterprise_linux:php53-cli, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:php-embedded, p-cpe:/a:redhat:enterprise_linux:php-mysql, p-cpe:/a:redhat:enterprise_linux:php53-soap, p-cpe:/a:redhat:enterprise_linux:php53-common, p-cpe:/a:redhat:enterprise_linux:php53-mbstring, p-cpe:/a:redhat:enterprise_linux:php-xml, p-cpe:/a:redhat:enterprise_linux:php-bcmath, p-cpe:/a:redhat:enterprise_linux:php-cli, p-cpe:/a:redhat:enterprise_linux:php-devel, p-cpe:/a:redhat:enterprise_linux:php53-odbc, p-cpe:/a:redhat:enterprise_linux:php-enchant, p-cpe:/a:redhat:enterprise_linux:php53-pgsql, p-cpe:/a:redhat:enterprise_linux:php53-devel, p-cpe:/a:redhat:enterprise_linux:php, p-cpe:/a:redhat:enterprise_linux:php53-bcmath, p-cpe:/a:redhat:enterprise_linux:php-tidy, p-cpe:/a:redhat:enterprise_linux:php-recode, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:php-gd, p-cpe:/a:redhat:enterprise_linux:php-snmp, p-cpe:/a:redhat:enterprise_linux:php-ldap, p-cpe:/a:redhat:enterprise_linux:php53-snmp, p-cpe:/a:redhat:enterprise_linux:php53-mysql, p-cpe:/a:redhat:enterprise_linux:php53-xml, p-cpe:/a:redhat:enterprise_linux:php-imap, p-cpe:/a:redhat:enterprise_linux:php-odbc, p-cpe:/a:redhat:enterprise_linux:php-xmlrpc, p-cpe:/a:redhat:enterprise_linux:php53-intl, p-cpe:/a:redhat:enterprise_linux:php53-pdo, p-cpe:/a:redhat:enterprise_linux:php-mbstring, p-cpe:/a:redhat:enterprise_linux:php53-dba, p-cpe:/a:redhat:enterprise_linux:php53-imap, p-cpe:/a:redhat:enterprise_linux:php-common, p-cpe:/a:redhat:enterprise_linux:php-intl, p-cpe:/a:redhat:enterprise_linux:php-soap, p-cpe:/a:redhat:enterprise_linux:php53-gd, p-cpe:/a:redhat:enterprise_linux:php53-xmlrpc, p-cpe:/a:redhat:enterprise_linux:php53-process, p-cpe:/a:redhat:enterprise_linux:php-pdo, p-cpe:/a:redhat:enterprise_linux:php-dba, p-cpe:/a:redhat:enterprise_linux:php53, p-cpe:/a:redhat:enterprise_linux:php-pgsql, p-cpe:/a:redhat:enterprise_linux:php-process
必要な KB アイテム: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2012/1/11
脆弱性公開日: 2011/11/29
Core Impact
CVE: CVE-2011-4566, CVE-2011-4885