Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 7.7
https://access.redhat.com/security/cve/cve-2018-16884
https://access.redhat.com/security/cve/cve-2019-3900
https://access.redhat.com/security/cve/cve-2019-3459
https://access.redhat.com/security/cve/cve-2019-3460
https://access.redhat.com/security/cve/cve-2019-3882
https://access.redhat.com/security/cve/cve-2019-5489
https://access.redhat.com/security/cve/cve-2019-7222
https://access.redhat.com/security/cve/cve-2019-11599
https://access.redhat.com/security/cve/cve-2019-11833
https://access.redhat.com/security/cve/cve-2015-1593
https://access.redhat.com/security/cve/cve-2019-9506
https://access.redhat.com/security/cve/cve-2019-10126
http://www.nessus.org/u?774148ae
https://access.redhat.com/security/cve/cve-2018-19854
https://access.redhat.com/security/cve/cve-2018-19985
https://access.redhat.com/security/cve/cve-2018-20169
https://access.redhat.com/security/cve/cve-2019-3874
https://access.redhat.com/security/cve/cve-2019-10207
https://access.redhat.com/security/cve/cve-2019-10638
https://access.redhat.com/security/cve/cve-2019-11884
https://access.redhat.com/security/cve/cve-2019-13233
https://access.redhat.com/security/cve/cve-2019-14821
https://access.redhat.com/security/cve/cve-2019-15916
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/cve-2019-15666
https://access.redhat.com/security/cve/cve-2019-15924
https://access.redhat.com/security/cve/cve-2019-15921
Severity: High
ID: 130547
File Name: redhat-RHSA-2019-3517.nasl
Version: 1.8
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/6/2019
Updated: 5/13/2020
Risk Factor: High
VPR Score: 7.7
CVSS Score Source: CVE-2019-10126
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal Vector: CVSS2#E:H/RL:OF/RC:C
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-doc:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-headers:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:perf:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:perf-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-abi-whitelists:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debuginfo-common-s390x:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-tools:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-tools-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-tools-libs:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-tools-libs-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:bpftool:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:bpftool-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-core:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-cross-headers:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug-core:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug-modules:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debug-modules-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-debuginfo-common-aarch64:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-modules:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-modules-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump-core:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump-modules:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:python3-perf:*:*:*:*:*:*:*, p-cpe:2.3:a:redhat:enterprise_linux:python3-perf-debuginfo:*:*:*:*:*:*:*
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/5/2019
Vulnerability Publication Date: 3/16/2015
CVE: CVE-2019-9506, CVE-2019-10207, CVE-2019-5489, CVE-2018-16884, CVE-2018-19854, CVE-2018-19985, CVE-2018-20169, CVE-2019-3459, CVE-2019-3460, CVE-2019-7222, CVE-2019-3882, CVE-2019-11833, CVE-2019-11884, CVE-2019-12382, CVE-2019-10126, CVE-2019-10638, CVE-2019-11599, CVE-2019-13233, CVE-2019-15916, CVE-2019-15924, CVE-2019-15921, CVE-2019-3900, CVE-2019-15666, CVE-2015-1593, CVE-2019-3874, CVE-2019-14821, CVE-2019-16994, CVE-2020-11669
RHSA: 2019:3517