Language:
https://cwe.mitre.org/data/definitions/119.html
https://cwe.mitre.org/data/definitions/125.html
https://cwe.mitre.org/data/definitions/476.html
https://cwe.mitre.org/data/definitions/918.html
https://access.redhat.com/security/cve/CVE-2020-35452
https://access.redhat.com/security/cve/CVE-2021-33193
https://access.redhat.com/security/cve/CVE-2021-36160
https://access.redhat.com/security/cve/CVE-2021-44224
https://access.redhat.com/errata/RHSA-2022:1915
https://bugzilla.redhat.com/1966724
https://bugzilla.redhat.com/1966728
Severity: High
ID: 161044
File Name: redhat-RHSA-2022-1915.nasl
Version: 1.3
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/11/2022
Updated: 5/17/2022
Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
Risk Factor: Medium
Score: 5.1
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal Vector: E:U/RL:OF/RC:C
CVSS Score Source: CVE-2020-35452
Risk Factor: High
Base Score: 8.2
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Temporal Vector: E:U/RL:O/RC:C
CVSS Score Source: CVE-2021-44224
CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:httpd, p-cpe:/a:redhat:enterprise_linux:httpd-devel, p-cpe:/a:redhat:enterprise_linux:httpd-filesystem, p-cpe:/a:redhat:enterprise_linux:httpd-manual, p-cpe:/a:redhat:enterprise_linux:httpd-tools, p-cpe:/a:redhat:enterprise_linux:mod_http2, p-cpe:/a:redhat:enterprise_linux:mod_ldap, p-cpe:/a:redhat:enterprise_linux:mod_md, p-cpe:/a:redhat:enterprise_linux:mod_proxy_html, p-cpe:/a:redhat:enterprise_linux:mod_session, p-cpe:/a:redhat:enterprise_linux:mod_ssl
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 5/10/2022
Vulnerability Publication Date: 6/3/2021
CVE: CVE-2020-35452, CVE-2021-33193, CVE-2021-36160, CVE-2021-44224