Language:
https://bugzilla.opensuse.org/show_bug.cgi?id=1100369
https://bugzilla.opensuse.org/show_bug.cgi?id=1109160
https://bugzilla.opensuse.org/show_bug.cgi?id=1118367
https://bugzilla.opensuse.org/show_bug.cgi?id=1118368
https://bugzilla.opensuse.org/show_bug.cgi?id=1128220
https://bugzilla.opensuse.org/show_bug.cgi?id=1156205
https://bugzilla.opensuse.org/show_bug.cgi?id=1157051
https://bugzilla.opensuse.org/show_bug.cgi?id=1161168
https://bugzilla.opensuse.org/show_bug.cgi?id=1170667
https://bugzilla.opensuse.org/show_bug.cgi?id=1170713
https://bugzilla.opensuse.org/show_bug.cgi?id=1171313
https://bugzilla.opensuse.org/show_bug.cgi?id=1171740
https://bugzilla.opensuse.org/show_bug.cgi?id=1172958
https://bugzilla.opensuse.org/show_bug.cgi?id=1173307
https://bugzilla.opensuse.org/show_bug.cgi?id=1173311
https://bugzilla.opensuse.org/show_bug.cgi?id=1173983
https://bugzilla.opensuse.org/show_bug.cgi?id=1175443
https://bugzilla.opensuse.org/show_bug.cgi?id=1176092
https://bugzilla.opensuse.org/show_bug.cgi?id=1176674
Severity: Medium
ID: 141560
File Name: openSUSE-2020-1699.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 10/20/2020
Updated: 2/15/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.2
Risk Factor: Medium
Base Score: 4
Temporal Score: 3.1
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS Score Source: CVE-2020-8624
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2018-5741
CPE: p-cpe:/a:novell:opensuse:libuv1-32bit, p-cpe:/a:novell:opensuse:bind-devel-32bit, p-cpe:/a:novell:opensuse:bind-debuginfo, p-cpe:/a:novell:opensuse:libirs1601-32bit-debuginfo, p-cpe:/a:novell:opensuse:sysuser-shadow, p-cpe:/a:novell:opensuse:libisccc1600, p-cpe:/a:novell:opensuse:libuv1-32bit-debuginfo, p-cpe:/a:novell:opensuse:libisccfg1600, p-cpe:/a:novell:opensuse:libisc1606-debuginfo, p-cpe:/a:novell:opensuse:libisccfg1600-32bit, p-cpe:/a:novell:opensuse:libuv-devel, p-cpe:/a:novell:opensuse:libdns1605, p-cpe:/a:novell:opensuse:libisccc1600-debuginfo, p-cpe:/a:novell:opensuse:bind-chrootenv, p-cpe:/a:novell:opensuse:libbind9-1600-debuginfo, p-cpe:/a:novell:opensuse:bind-devel, p-cpe:/a:novell:opensuse:libdns1605-debuginfo, p-cpe:/a:novell:opensuse:libisccfg1600-debuginfo, p-cpe:/a:novell:opensuse:libns1604-debuginfo, p-cpe:/a:novell:opensuse:libisc1606, p-cpe:/a:novell:opensuse:libirs-devel, p-cpe:/a:novell:opensuse:bind, p-cpe:/a:novell:opensuse:libirs1601, p-cpe:/a:novell:opensuse:libdns1605-32bit, p-cpe:/a:novell:opensuse:bind-utils-debuginfo, p-cpe:/a:novell:opensuse:libbind9-1600, p-cpe:/a:novell:opensuse:libdns1605-32bit-debuginfo, p-cpe:/a:novell:opensuse:python3-bind, p-cpe:/a:novell:opensuse:libisc1606-32bit, p-cpe:/a:novell:opensuse:libuv-debugsource, p-cpe:/a:novell:opensuse:libbind9-1600-32bit-debuginfo, p-cpe:/a:novell:opensuse:libuv1, p-cpe:/a:novell:opensuse:bind-utils, p-cpe:/a:novell:opensuse:libuv1-debuginfo, p-cpe:/a:novell:opensuse:libirs1601-debuginfo, p-cpe:/a:novell:opensuse:libns1604-32bit-debuginfo, p-cpe:/a:novell:opensuse:libbind9-1600-32bit, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:libisccfg1600-32bit-debuginfo, p-cpe:/a:novell:opensuse:libns1604, p-cpe:/a:novell:opensuse:libisccc1600-32bit-debuginfo, p-cpe:/a:novell:opensuse:sysuser-tools, p-cpe:/a:novell:opensuse:libirs1601-32bit, p-cpe:/a:novell:opensuse:libns1604-32bit, p-cpe:/a:novell:opensuse:libisccc1600-32bit, p-cpe:/a:novell:opensuse:libisc1606-32bit-debuginfo, p-cpe:/a:novell:opensuse:bind-debugsource
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/19/2020
Vulnerability Publication Date: 1/16/2019
CVE: CVE-2017-3136, CVE-2018-5741, CVE-2019-6477, CVE-2020-8616, CVE-2020-8617, CVE-2020-8618, CVE-2020-8619, CVE-2020-8620, CVE-2020-8621, CVE-2020-8622, CVE-2020-8623, CVE-2020-8624