Language:
http://www.nessus.org/u?a1f864f2
https://bugzilla.redhat.com/show_bug.cgi?id=1311722
https://bugzilla.redhat.com/show_bug.cgi?id=1311946
https://bugzilla.redhat.com/show_bug.cgi?id=1311947
https://bugzilla.redhat.com/show_bug.cgi?id=1311948
https://bugzilla.redhat.com/show_bug.cgi?id=1311949
https://bugzilla.redhat.com/show_bug.cgi?id=1311950
https://bugzilla.redhat.com/show_bug.cgi?id=1335415
https://bugzilla.redhat.com/show_bug.cgi?id=1335416
https://bugzilla.redhat.com/show_bug.cgi?id=1335417
https://bugzilla.redhat.com/show_bug.cgi?id=1335418
https://bugzilla.redhat.com/show_bug.cgi?id=1335420
https://bugzilla.redhat.com/show_bug.cgi?id=1335421
https://bugzilla.redhat.com/show_bug.cgi?id=1335422
https://bugzilla.redhat.com/show_bug.cgi?id=1358938
https://bugzilla.redhat.com/show_bug.cgi?id=1361305
https://bugzilla.redhat.com/show_bug.cgi?id=1361306
https://bugzilla.redhat.com/show_bug.cgi?id=1361307
https://bugzilla.redhat.com/show_bug.cgi?id=1362666
https://access.redhat.com/errata/RHSA-2016:1773
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=1129074
https://bugzilla.redhat.com/show_bug.cgi?id=1196783
https://bugzilla.redhat.com/show_bug.cgi?id=1217403
https://bugzilla.redhat.com/show_bug.cgi?id=1266239
https://bugzilla.redhat.com/show_bug.cgi?id=1274852
Severity: Critical
ID: 119378
File Name: redhat-RHSA-2016-1773.nasl
Version: 1.9
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/4/2018
Updated: 6/3/2024
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-0788
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2016-0791
CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-cron, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-proxy, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-haproxy-sni-proxy, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-perl, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-admin-console, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jenkins-client, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-msg-broker-mcollective, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-nodejs, p-cpe:/a:redhat:enterprise_linux:openshift-origin-msg-node-mcollective, p-cpe:/a:redhat:enterprise_linux:imagemagick-perl, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-routing-daemon, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-mysql, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy, p-cpe:/a:redhat:enterprise_linux:imagemagick, p-cpe:/a:redhat:enterprise_linux:activemq-client, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-python, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-php, p-cpe:/a:redhat:enterprise_linux:libcgroup-pam, p-cpe:/a:redhat:enterprise_linux:imagemagick-devel, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbosseap, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-ruby, p-cpe:/a:redhat:enterprise_linux:activemq, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:imagemagick-doc, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-diy, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbossews, p-cpe:/a:redhat:enterprise_linux:libcgroup, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-mongodb
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/24/2016
Vulnerability Publication Date: 8/21/2014
CANVAS (CANVAS)
Core Impact
Metasploit (Jenkins XStream Groovy classpath Deserialization Vulnerability)
CVE: CVE-2014-3577, CVE-2015-7501, CVE-2016-0788, CVE-2016-0789, CVE-2016-0790, CVE-2016-0791, CVE-2016-0792, CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727