Language:
http://www.nessus.org/u?eda4d0b0
https://access.redhat.com/errata/RHSA-2017:3389
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1399240
https://bugzilla.redhat.com/show_bug.cgi?id=1434942
https://bugzilla.redhat.com/show_bug.cgi?id=1441089
https://bugzilla.redhat.com/show_bug.cgi?id=1457042
https://bugzilla.redhat.com/show_bug.cgi?id=1458186
https://bugzilla.redhat.com/show_bug.cgi?id=1465532
https://bugzilla.redhat.com/show_bug.cgi?id=1471251
https://bugzilla.redhat.com/show_bug.cgi?id=1476026
https://bugzilla.redhat.com/show_bug.cgi?id=1479955
https://bugzilla.redhat.com/show_bug.cgi?id=1481550
https://bugzilla.redhat.com/show_bug.cgi?id=1489023
https://bugzilla.redhat.com/show_bug.cgi?id=1489024
https://bugzilla.redhat.com/show_bug.cgi?id=1490719
https://bugzilla.redhat.com/show_bug.cgi?id=1492194
https://bugzilla.redhat.com/show_bug.cgi?id=1493213
https://bugzilla.redhat.com/show_bug.cgi?id=1494239
https://bugzilla.redhat.com/show_bug.cgi?id=1495540
https://bugzilla.redhat.com/show_bug.cgi?id=1496232
https://bugzilla.redhat.com/show_bug.cgi?id=1497042
https://bugzilla.redhat.com/show_bug.cgi?id=1497836
https://bugzilla.redhat.com/show_bug.cgi?id=1498635
https://bugzilla.redhat.com/show_bug.cgi?id=1499176
https://bugzilla.redhat.com/show_bug.cgi?id=1499635
https://bugzilla.redhat.com/show_bug.cgi?id=1499813
https://bugzilla.redhat.com/show_bug.cgi?id=1500364
https://bugzilla.redhat.com/show_bug.cgi?id=1500464
https://bugzilla.redhat.com/show_bug.cgi?id=1500471
https://bugzilla.redhat.com/show_bug.cgi?id=1500513
https://bugzilla.redhat.com/show_bug.cgi?id=1500644
https://bugzilla.redhat.com/show_bug.cgi?id=1501517
https://bugzilla.redhat.com/show_bug.cgi?id=1501948
https://bugzilla.redhat.com/show_bug.cgi?id=1501960
https://bugzilla.redhat.com/show_bug.cgi?id=1501986
https://bugzilla.redhat.com/show_bug.cgi?id=1502789
https://bugzilla.redhat.com/show_bug.cgi?id=1503265
https://bugzilla.redhat.com/show_bug.cgi?id=1503563
https://bugzilla.redhat.com/show_bug.cgi?id=1505683
https://bugzilla.redhat.com/show_bug.cgi?id=1505898
Severity: Medium
ID: 119390
File Name: redhat-RHSA-2017-3389.nasl
Version: 1.7
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/4/2018
Updated: 11/5/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Low
Score: 2.5
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2017-12195
Risk Factor: Medium
Base Score: 4.8
Temporal Score: 4.2
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-federation-services, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-catalog, p-cpe:/a:redhat:enterprise_linux:tuned-profiles-atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:openshift-elasticsearch-plugin, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:cockpit-kubernetes, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-docker-excluder, p-cpe:/a:redhat:enterprise_linux:cockpit, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 12/7/2017
Vulnerability Publication Date: 7/27/2018
CVE: CVE-2017-12195