Language:
https://bugzilla.suse.com/1183735
https://bugzilla.suse.com/1187120
https://bugzilla.suse.com/1189492
Severity: High
ID: 153006
File Name: openSUSE-2021-2941.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 9/4/2021
Updated: 1/20/2022
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 9.3
Temporal Score: 6.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-3621
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:sssd-krb5-common, p-cpe:/a:novell:opensuse:python3-sss-murmur, p-cpe:/a:novell:opensuse:libipa_hbac-devel, p-cpe:/a:novell:opensuse:sssd-wbclient, p-cpe:/a:novell:opensuse:sssd-proxy, p-cpe:/a:novell:opensuse:sssd-tools, p-cpe:/a:novell:opensuse:libipa_hbac0, p-cpe:/a:novell:opensuse:libnfsidmap-sss, p-cpe:/a:novell:opensuse:python3-sss_nss_idmap, p-cpe:/a:novell:opensuse:sssd-winbind-idmap, p-cpe:/a:novell:opensuse:python3-ipa_hbac, p-cpe:/a:novell:opensuse:python3-sssd-config, p-cpe:/a:novell:opensuse:sssd-ad, p-cpe:/a:novell:opensuse:libsss_idmap-devel, p-cpe:/a:novell:opensuse:sssd-wbclient-devel, p-cpe:/a:novell:opensuse:libsss_nss_idmap-devel, p-cpe:/a:novell:opensuse:libsss_certmap-devel, p-cpe:/a:novell:opensuse:sssd-ldap, p-cpe:/a:novell:opensuse:sssd-dbus, p-cpe:/a:novell:opensuse:sssd, p-cpe:/a:novell:opensuse:libsss_certmap0, p-cpe:/a:novell:opensuse:libsss_simpleifp0, p-cpe:/a:novell:opensuse:sssd-krb5, p-cpe:/a:novell:opensuse:sssd-ipa, p-cpe:/a:novell:opensuse:libsss_simpleifp-devel, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:sssd-common, p-cpe:/a:novell:opensuse:libsss_idmap0, p-cpe:/a:novell:opensuse:libsss_nss_idmap0
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 9/3/2021
Vulnerability Publication Date: 8/16/2021
CVE: CVE-2021-3621