Language:
http://security.gd-linux.com/notice/NS-SA-2021-0167
http://security.gd-linux.com/info/CVE-2019-14907
http://security.gd-linux.com/info/CVE-2020-14318
Severity: Medium
ID: 154485
File Name: newstart_cgsl_NS-SA-2021-0167_samba.nasl
Version: 1.11
Type: local
Published: 10/27/2021
Updated: 11/28/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 10.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-1472
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 4.1
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2020-14318
CPE: p-cpe:/a:zte:cgsl_main:samba-winbind-modules, p-cpe:/a:zte:cgsl_core:samba-test-libs, cpe:/o:zte:cgsl_main:5, p-cpe:/a:zte:cgsl_main:samba-winbind-krb5-locator, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_main:samba-client-libs, p-cpe:/a:zte:cgsl_main:libwbclient, p-cpe:/a:zte:cgsl_core:samba-krb5-printing, p-cpe:/a:zte:cgsl_core:samba-python-test, p-cpe:/a:zte:cgsl_core:samba-winbind-krb5-locator, p-cpe:/a:zte:cgsl_main:samba-common-libs, p-cpe:/a:zte:cgsl_main:samba-python, p-cpe:/a:zte:cgsl_core:samba-client, p-cpe:/a:zte:cgsl_main:samba-devel, p-cpe:/a:zte:cgsl_core:samba-dc-libs, p-cpe:/a:zte:cgsl_core:ctdb, p-cpe:/a:zte:cgsl_main:samba-common, p-cpe:/a:zte:cgsl_core:samba-common, p-cpe:/a:zte:cgsl_main:samba-test, p-cpe:/a:zte:cgsl_main:libwbclient-devel, p-cpe:/a:zte:cgsl_main:samba-dc, p-cpe:/a:zte:cgsl_core:samba-common-tools, p-cpe:/a:zte:cgsl_core:ctdb-tests, p-cpe:/a:zte:cgsl_main:samba-common-tools, p-cpe:/a:zte:cgsl_core:samba-test, p-cpe:/a:zte:cgsl_main:samba-python-test, p-cpe:/a:zte:cgsl_main:samba-client, p-cpe:/a:zte:cgsl_core:samba-python, p-cpe:/a:zte:cgsl_main:samba-vfs-glusterfs, p-cpe:/a:zte:cgsl_core:samba-libs, p-cpe:/a:zte:cgsl_core:samba-client-libs, p-cpe:/a:zte:cgsl_core:libwbclient, p-cpe:/a:zte:cgsl_core:samba-winbind-modules, p-cpe:/a:zte:cgsl_core:libsmbclient, p-cpe:/a:zte:cgsl_core:samba-winbind-clients, p-cpe:/a:zte:cgsl_main:samba, p-cpe:/a:zte:cgsl_core:libsmbclient-devel, p-cpe:/a:zte:cgsl_main:samba-krb5-printing, p-cpe:/a:zte:cgsl_main:samba-test-libs, p-cpe:/a:zte:cgsl_core:samba-winbind, p-cpe:/a:zte:cgsl_core:samba-devel, p-cpe:/a:zte:cgsl_main:samba-dc-libs, p-cpe:/a:zte:cgsl_core:libwbclient-devel, p-cpe:/a:zte:cgsl_main:samba-libs, p-cpe:/a:zte:cgsl_main:samba-winbind, p-cpe:/a:zte:cgsl_core:samba, p-cpe:/a:zte:cgsl_core:samba-pidl, p-cpe:/a:zte:cgsl_core:samba-vfs-glusterfs, p-cpe:/a:zte:cgsl_core:samba-common-libs, p-cpe:/a:zte:cgsl_main:libsmbclient, p-cpe:/a:zte:cgsl_main:samba-winbind-clients, p-cpe:/a:zte:cgsl_core:samba-dc, p-cpe:/a:zte:cgsl_main:samba-pidl
Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/24/2021
Vulnerability Publication Date: 1/21/2020
CISA Known Exploited Vulnerability Due Dates: 9/21/2020
CVE: CVE-2019-14907, CVE-2020-14318, CVE-2020-14323, CVE-2020-1472
CISA-NCAS: AA22-011A
IAVA: 2020-A-0035-S, 2020-A-0438-S, 2020-A-0508-S