Language:
http://www.nessus.org/u?290a296f
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/errata/RHSA-2020:3807
https://bugzilla.redhat.com/show_bug.cgi?id=1625499
https://bugzilla.redhat.com/show_bug.cgi?id=1638217
https://bugzilla.redhat.com/show_bug.cgi?id=1643520
https://bugzilla.redhat.com/show_bug.cgi?id=1674420
https://bugzilla.redhat.com/show_bug.cgi?id=1748879
https://bugzilla.redhat.com/show_bug.cgi?id=1749803
https://bugzilla.redhat.com/show_bug.cgi?id=1758024
https://bugzilla.redhat.com/show_bug.cgi?id=1763812
https://bugzilla.redhat.com/show_bug.cgi?id=1778471
https://bugzilla.redhat.com/show_bug.cgi?id=1787854
https://bugzilla.redhat.com/show_bug.cgi?id=1801206
https://bugzilla.redhat.com/show_bug.cgi?id=1803856
https://bugzilla.redhat.com/show_bug.cgi?id=1804037
https://bugzilla.redhat.com/show_bug.cgi?id=1804046
https://bugzilla.redhat.com/show_bug.cgi?id=1806339
https://bugzilla.redhat.com/show_bug.cgi?id=1816951
https://bugzilla.redhat.com/show_bug.cgi?id=1819260
https://bugzilla.redhat.com/show_bug.cgi?id=1826255
https://bugzilla.redhat.com/show_bug.cgi?id=1828406
https://bugzilla.redhat.com/show_bug.cgi?id=1831949
https://bugzilla.redhat.com/show_bug.cgi?id=1831952
https://bugzilla.redhat.com/show_bug.cgi?id=1831954
https://bugzilla.redhat.com/show_bug.cgi?id=1831956
https://bugzilla.redhat.com/show_bug.cgi?id=1838051
https://bugzilla.redhat.com/show_bug.cgi?id=1841112
https://bugzilla.redhat.com/show_bug.cgi?id=1843234
https://bugzilla.redhat.com/show_bug.cgi?id=1850004
https://bugzilla.redhat.com/show_bug.cgi?id=1854488
https://bugzilla.redhat.com/show_bug.cgi?id=1855377
https://bugzilla.redhat.com/show_bug.cgi?id=1857412
https://bugzilla.redhat.com/show_bug.cgi?id=1858184
https://bugzilla.redhat.com/show_bug.cgi?id=1859460
https://bugzilla.redhat.com/show_bug.cgi?id=1860907
https://bugzilla.redhat.com/show_bug.cgi?id=1866466
https://bugzilla.redhat.com/show_bug.cgi?id=1866734
https://bugzilla.redhat.com/show_bug.cgi?id=1869209
https://bugzilla.redhat.com/show_bug.cgi?id=1869302
https://bugzilla.redhat.com/show_bug.cgi?id=1871235
Severity: High
ID: 140750
File Name: redhat-RHSA-2020-3807.nasl
Version: 1.12
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 9/23/2020
Updated: 11/7/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.0
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.5
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSS Score Source: CVE-2020-8203
Risk Factor: High
Base Score: 7.4
Temporal Score: 6.7
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:python3-ovirt-engine-lib, p-cpe:/a:redhat:enterprise_linux:rhvm, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-webadmin-portal, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-health-check-bundler, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-cinderlib, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-ovirt-engine-common, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-websocket-proxy, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-vmconsole-proxy-helper, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-tools-backup, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:ovirt-engine, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-vmconsole-proxy-helper, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-ovirt-engine, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-plugin-imageio, p-cpe:/a:redhat:enterprise_linux:ovirt-web-ui, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-dbscripts, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-tools, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-backend, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-websocket-proxy, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-restapi, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-setup-base, p-cpe:/a:redhat:enterprise_linux:ovirt-engine-ui-extensions
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/23/2020
Vulnerability Publication Date: 4/29/2020
CVE: CVE-2020-11022, CVE-2020-11023, CVE-2020-14333, CVE-2020-8203