Severity: Medium
ID: 206505
File Name: oraclelinux_ELSA-2024-6197.nasl
Version: 1.2
Type: local
Agent: unix
Published: 9/3/2024
Updated: 9/4/2024
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 7.9
Risk Factor: Medium
Base Score: 5.6
Temporal Score: 4.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:P
CVSS Score Source: CVE-2024-33870
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.9
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2024-29510
CPE: p-cpe:/a:oracle:linux:ghostscript-tools-printing, p-cpe:/a:oracle:linux:ghostscript-doc, p-cpe:/a:oracle:linux:libgs-devel, p-cpe:/a:oracle:linux:ghostscript-tools-fonts, p-cpe:/a:oracle:linux:ghostscript-x11, p-cpe:/a:oracle:linux:ghostscript, p-cpe:/a:oracle:linux:libgs, cpe:/a:oracle:linux:9::codeready_builder, cpe:/a:oracle:linux:9::appstream, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:ghostscript-tools-dvipdf
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/3/2024
Vulnerability Publication Date: 6/13/2024
Metasploit (Ghostscript Command Execution via Format String)
CVE: CVE-2024-29510, CVE-2024-33869, CVE-2024-33870
IAVB: 2024-B-0074