Language:
Severity: Critical
ID: 119472
File Name: ala_ALAS-2018-1113.nasl
Version: 1.5
Type: local
Agent: unix
Published: 12/7/2018
Updated: 7/17/2024
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2018-16395
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:rubygems23-devel, p-cpe:/a:amazon:linux:ruby23-debuginfo, p-cpe:/a:amazon:linux:ruby23-doc, p-cpe:/a:amazon:linux:ruby24, p-cpe:/a:amazon:linux:rubygems23, p-cpe:/a:amazon:linux:ruby23-irb, p-cpe:/a:amazon:linux:ruby23-devel, p-cpe:/a:amazon:linux:rubygem23-io-console, p-cpe:/a:amazon:linux:rubygem23-json, p-cpe:/a:amazon:linux:rubygem24-did_you_mean, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:ruby23-libs, p-cpe:/a:amazon:linux:ruby23, p-cpe:/a:amazon:linux:rubygem23-bigdecimal, p-cpe:/a:amazon:linux:rubygem24-json, p-cpe:/a:amazon:linux:rubygem24-io-console, p-cpe:/a:amazon:linux:rubygem23-psych, p-cpe:/a:amazon:linux:ruby24-doc, p-cpe:/a:amazon:linux:rubygem24-xmlrpc, p-cpe:/a:amazon:linux:ruby24-libs, p-cpe:/a:amazon:linux:rubygems24, p-cpe:/a:amazon:linux:ruby24-irb, p-cpe:/a:amazon:linux:rubygems24-devel, p-cpe:/a:amazon:linux:rubygem24-bigdecimal, p-cpe:/a:amazon:linux:ruby24-devel, p-cpe:/a:amazon:linux:rubygem23-did_you_mean, p-cpe:/a:amazon:linux:rubygem24-psych, p-cpe:/a:amazon:linux:ruby24-debuginfo
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/14/2018
Vulnerability Publication Date: 11/16/2018
CVE: CVE-2018-16395, CVE-2018-16396
ALAS: 2018-1113