Language:
https://access.redhat.com/security/vulnerabilities/3716411
https://docs.openshift.com/container-platform/3.11/release_notes/
https://access.redhat.com/errata/RHSA-2018:3537
https://access.redhat.com/security/cve/cve-2018-3830
Severity: Critical
ID: 119408
File Name: redhat-RHSA-2018-3537.nasl
Version: 1.6
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/4/2018
Updated: 10/24/2019
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node-problem-detector, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-idler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-template-service-broker, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-snapshot-controller, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-snapshot-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-monitor-project-lifecycle, p-cpe:/a:redhat:enterprise_linux:openshift-monitor-sample-app, p-cpe:/a:redhat:enterprise_linux:prometheus, p-cpe:/a:redhat:enterprise_linux:prometheus-alertmanager, p-cpe:/a:redhat:enterprise_linux:prometheus-node-exporter, p-cpe:/a:redhat:enterprise_linux:python-elasticsearch, p-cpe:/a:redhat:enterprise_linux:python-nose-xcover, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog-svcat, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-autoscaler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-descheduler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-docker-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-hyperkube, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-hypershift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-metrics-server, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-web-console, p-cpe:/a:redhat:enterprise_linux:cri-o, p-cpe:/a:redhat:enterprise_linux:golang-github-openshift-oauth-proxy, p-cpe:/a:redhat:enterprise_linux:jenkins-2-plugins, p-cpe:/a:redhat:enterprise_linux:kibana, p-cpe:/a:redhat:enterprise_linux:kibana-debuginfo, p-cpe:/a:redhat:enterprise_linux:openshift-ansible, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-docs, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-playbooks, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-roles, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-autoheal, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-cephfs-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-debuginfo, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-efs-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-local-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-manila-provisioner
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/20/2018
Vulnerability Publication Date: 8/21/2018
CVE: CVE-2018-1002105, CVE-2018-12115, CVE-2018-3830
RHSA: 2018:3537