Language:
Severity: Critical
ID: 108846
File Name: ala_ALAS-2018-983.nasl
Version: 1.5
Type: local
Agent: unix
Published: 4/6/2018
Updated: 11/20/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2018-8780
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2018-1000076
CPE: p-cpe:/a:amazon:linux:rubygem20-bigdecimal, p-cpe:/a:amazon:linux:rubygem20-psych, p-cpe:/a:amazon:linux:rubygems23-devel, p-cpe:/a:amazon:linux:ruby23-debuginfo, p-cpe:/a:amazon:linux:ruby23-doc, p-cpe:/a:amazon:linux:ruby24, p-cpe:/a:amazon:linux:rubygems23, p-cpe:/a:amazon:linux:ruby20-debuginfo, p-cpe:/a:amazon:linux:ruby23-devel, p-cpe:/a:amazon:linux:ruby23-irb, p-cpe:/a:amazon:linux:ruby22-devel, p-cpe:/a:amazon:linux:rubygem22-psych, p-cpe:/a:amazon:linux:rubygem23-io-console, p-cpe:/a:amazon:linux:rubygem23-json, p-cpe:/a:amazon:linux:rubygem24-did_you_mean, p-cpe:/a:amazon:linux:ruby20-libs, p-cpe:/a:amazon:linux:ruby20-doc, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:rubygems22, p-cpe:/a:amazon:linux:rubygem22-bigdecimal, p-cpe:/a:amazon:linux:ruby23-libs, p-cpe:/a:amazon:linux:ruby23, p-cpe:/a:amazon:linux:rubygem23-bigdecimal, p-cpe:/a:amazon:linux:rubygem24-json, p-cpe:/a:amazon:linux:ruby20, p-cpe:/a:amazon:linux:rubygems22-devel, p-cpe:/a:amazon:linux:ruby20-devel, p-cpe:/a:amazon:linux:rubygem24-io-console, p-cpe:/a:amazon:linux:rubygem20-io-console, p-cpe:/a:amazon:linux:rubygem23-psych, p-cpe:/a:amazon:linux:ruby24-doc, p-cpe:/a:amazon:linux:ruby22-doc, p-cpe:/a:amazon:linux:rubygem24-xmlrpc, p-cpe:/a:amazon:linux:ruby20-irb, p-cpe:/a:amazon:linux:ruby22, p-cpe:/a:amazon:linux:ruby24-libs, p-cpe:/a:amazon:linux:rubygems20-devel, p-cpe:/a:amazon:linux:ruby22-libs, p-cpe:/a:amazon:linux:ruby22-irb, p-cpe:/a:amazon:linux:rubygems24, p-cpe:/a:amazon:linux:rubygems20, p-cpe:/a:amazon:linux:ruby24-irb, p-cpe:/a:amazon:linux:rubygems24-devel, p-cpe:/a:amazon:linux:ruby22-debuginfo, p-cpe:/a:amazon:linux:rubygem24-bigdecimal, p-cpe:/a:amazon:linux:ruby24-devel, p-cpe:/a:amazon:linux:rubygem23-did_you_mean, p-cpe:/a:amazon:linux:rubygem24-psych, p-cpe:/a:amazon:linux:rubygem22-io-console, p-cpe:/a:amazon:linux:ruby24-debuginfo
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/10/2018
Vulnerability Publication Date: 12/20/2017
CVE: CVE-2017-17742, CVE-2017-17790, CVE-2018-1000073, CVE-2018-1000074, CVE-2018-1000075, CVE-2018-1000076, CVE-2018-1000077, CVE-2018-1000078, CVE-2018-1000079, CVE-2018-6914, CVE-2018-8777, CVE-2018-8778, CVE-2018-8779, CVE-2018-8780
ALAS: 2018-983