Language:
https://bugzilla.suse.com/1186761
Severity: Medium
ID: 153911
File Name: openSUSE-2021-3293.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 10/7/2021
Updated: 11/28/2023
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2020-22042
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:libavdevice57, p-cpe:/a:novell:opensuse:libavcodec-devel, p-cpe:/a:novell:opensuse:libpostproc-devel, p-cpe:/a:novell:opensuse:libavutil55, p-cpe:/a:novell:opensuse:libavdevice57-32bit, p-cpe:/a:novell:opensuse:libavfilter6-32bit, p-cpe:/a:novell:opensuse:libswscale-devel, p-cpe:/a:novell:opensuse:libavfilter6, p-cpe:/a:novell:opensuse:libavutil55-32bit, p-cpe:/a:novell:opensuse:libswscale4, p-cpe:/a:novell:opensuse:libswscale4-32bit, p-cpe:/a:novell:opensuse:ffmpeg-private-devel, p-cpe:/a:novell:opensuse:libavdevice-devel, p-cpe:/a:novell:opensuse:libpostproc54-32bit, p-cpe:/a:novell:opensuse:libswresample2-32bit, p-cpe:/a:novell:opensuse:libavresample-devel, p-cpe:/a:novell:opensuse:libavresample3, p-cpe:/a:novell:opensuse:libavresample3-32bit, p-cpe:/a:novell:opensuse:libavformat57, p-cpe:/a:novell:opensuse:libswresample2, p-cpe:/a:novell:opensuse:libavcodec57-32bit, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:ffmpeg, p-cpe:/a:novell:opensuse:libavfilter-devel, p-cpe:/a:novell:opensuse:libpostproc54, p-cpe:/a:novell:opensuse:libavformat-devel, p-cpe:/a:novell:opensuse:libavcodec57, p-cpe:/a:novell:opensuse:libavformat57-32bit, p-cpe:/a:novell:opensuse:libavutil-devel, p-cpe:/a:novell:opensuse:libswresample-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/6/2021
Vulnerability Publication Date: 6/1/2021
CVE: CVE-2020-22042