Language:
https://bugzilla.novell.com/show_bug.cgi?id=794824
https://bugzilla.novell.com/show_bug.cgi?id=806431
https://bugzilla.novell.com/show_bug.cgi?id=831058
https://bugzilla.novell.com/show_bug.cgi?id=854722
https://bugzilla.novell.com/show_bug.cgi?id=856756
https://bugzilla.novell.com/show_bug.cgi?id=871797
https://bugzilla.novell.com/show_bug.cgi?id=877257
https://bugzilla.novell.com/show_bug.cgi?id=879921
https://bugzilla.novell.com/show_bug.cgi?id=880484
https://bugzilla.novell.com/show_bug.cgi?id=881051
https://bugzilla.novell.com/show_bug.cgi?id=882809
https://bugzilla.novell.com/show_bug.cgi?id=883526
https://bugzilla.novell.com/show_bug.cgi?id=883724
https://bugzilla.novell.com/show_bug.cgi?id=883795
https://bugzilla.novell.com/show_bug.cgi?id=884530
https://bugzilla.novell.com/show_bug.cgi?id=885422
https://bugzilla.novell.com/show_bug.cgi?id=885725
https://bugzilla.novell.com/show_bug.cgi?id=887082
https://bugzilla.novell.com/show_bug.cgi?id=889173
https://bugzilla.novell.com/show_bug.cgi?id=892490
http://www.nessus.org/u?05c35e93
http://www.nessus.org/u?780d66eb
http://www.nessus.org/u?ac80d87e
http://www.nessus.org/u?98552c52
http://www.nessus.org/u?f9c0b05a
http://www.nessus.org/u?840438e1
https://www.suse.com/security/cve/CVE-2013-1860/
https://www.suse.com/security/cve/CVE-2013-4162/
https://www.suse.com/security/cve/CVE-2013-7266/
https://www.suse.com/security/cve/CVE-2013-7267/
https://www.suse.com/security/cve/CVE-2013-7268/
https://www.suse.com/security/cve/CVE-2013-7269/
https://www.suse.com/security/cve/CVE-2013-7270/
https://www.suse.com/security/cve/CVE-2013-7271/
https://www.suse.com/security/cve/CVE-2014-0203/
https://www.suse.com/security/cve/CVE-2014-3144/
https://www.suse.com/security/cve/CVE-2014-3145/
https://www.suse.com/security/cve/CVE-2014-3917/
https://www.suse.com/security/cve/CVE-2014-4508/
https://www.suse.com/security/cve/CVE-2014-4652/
https://www.suse.com/security/cve/CVE-2014-4653/
https://www.suse.com/security/cve/CVE-2014-4654/
https://www.suse.com/security/cve/CVE-2014-4655/
https://www.suse.com/security/cve/CVE-2014-4656/
https://www.suse.com/security/cve/CVE-2014-4667/
https://www.suse.com/security/cve/CVE-2014-4699/
https://www.suse.com/security/cve/CVE-2014-4943/
深刻度: Medium
ID: 83640
ファイル名: suse_SU-2014-1138-1.nasl
バージョン: 2.14
タイプ: local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2015/5/20
更新日: 2021/1/19
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
リスクファクター: High
スコア: 8.9
リスクファクター: Medium
基本値: 6.9
現状値: 5.7
ベクトル: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:xen-kmp-default, p-cpe:/a:novell:suse_linux:xen-kmp-pae, p-cpe:/a:novell:suse_linux:xen-kmp-trace, cpe:/o:novell:suse_linux:11
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2014/9/16
脆弱性公開日: 2013/3/22
CANVAS (CANVAS)
Core Impact
CVE: CVE-2013-1860, CVE-2013-4162, CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271, CVE-2014-0203, CVE-2014-3144, CVE-2014-3145, CVE-2014-3917, CVE-2014-4508, CVE-2014-4652, CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, CVE-2014-4667, CVE-2014-4699, CVE-2014-4943, CVE-2014-5077
BID: 64743, 64744, 64746, 67309, 67321, 67699, 68125, 68126, 68162, 68163, 68164, 68170, 68224, 68411, 68683, 68768, 68881, 58510, 61411, 64739, 64741, 64742