Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 5.9
http://www.nessus.org/u?c6b506c4
https://access.redhat.com/errata/RHSA-2013:1645
https://access.redhat.com/security/cve/cve-2012-6542
https://access.redhat.com/security/cve/cve-2013-1929
https://access.redhat.com/security/cve/cve-2013-3231
https://access.redhat.com/security/cve/cve-2012-6545
https://access.redhat.com/security/cve/cve-2013-2164
https://access.redhat.com/security/cve/cve-2013-2234
https://access.redhat.com/security/cve/cve-2013-2851
https://access.redhat.com/security/cve/cve-2013-0343
https://access.redhat.com/security/cve/cve-2013-4345
https://access.redhat.com/security/cve/cve-2013-2888
https://access.redhat.com/security/cve/cve-2013-4387
https://access.redhat.com/security/cve/cve-2013-2892
https://access.redhat.com/security/cve/cve-2013-1928
https://access.redhat.com/security/cve/cve-2013-4592
Severity: Medium
ID: 71013
File Name: redhat-RHSA-2013-1645.nasl
Version: 1.18
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/21/2013
Updated: 1/14/2021
Dependencies: ssh_get_info.nasl, linux_alt_patch_detect.nasl
Risk Factor: Medium
VPR Score: 5.9
Base Score: 6.2
Temporal Score: 4.6
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Temporal Vector: E:U/RL:OF/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686, p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x, p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-doc, p-cpe:/a:redhat:enterprise_linux:kernel-firmware, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:perf-debuginfo, p-cpe:/a:redhat:enterprise_linux:python-perf, p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo, cpe:/o:redhat:enterprise_linux:6
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/21/2013
Vulnerability Publication Date: 2/28/2013
CVE: CVE-2012-6542, CVE-2012-6545, CVE-2013-0343, CVE-2013-1928, CVE-2013-1929, CVE-2013-2164, CVE-2013-2234, CVE-2013-2851, CVE-2013-2888, CVE-2013-2889, CVE-2013-2892, CVE-2013-3231, CVE-2013-4345, CVE-2013-4387, CVE-2013-4591, CVE-2013-4592
BID: 58795, 58906, 58908, 58989, 58991, 59390, 60375, 60409, 60874, 62042, 62043, 62049, 62696, 62740, 63790, 63791
RHSA: 2013:1645