Language:
http://security.gd-linux.com/notice/NS-SA-2021-0134
Severity: High
ID: 154556
File Name: newstart_cgsl_NS-SA-2021-0134_perl.nasl
Version: 1.4
Type: local
Published: 10/27/2021
Updated: 11/27/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 4.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-10878
Risk Factor: High
Base Score: 8.6
Temporal Score: 8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:perl-test, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:perl-extutils-embed, p-cpe:/a:zte:cgsl_main:perl-pod-html, p-cpe:/a:zte:cgsl_main:perl-interpreter, p-cpe:/a:zte:cgsl_main:perl-macros, p-cpe:/a:zte:cgsl_main:perl-devel-peek, p-cpe:/a:zte:cgsl_main:perl-time-piece, p-cpe:/a:zte:cgsl_main:perl-extutils-miniperl, p-cpe:/a:zte:cgsl_main:perl-io-debuginfo, p-cpe:/a:zte:cgsl_main:perl-devel, p-cpe:/a:zte:cgsl_main:perl-utils, p-cpe:/a:zte:cgsl_main:perl-math-complex, p-cpe:/a:zte:cgsl_main:perl-open, p-cpe:/a:zte:cgsl_main:perl-attribute-handlers, p-cpe:/a:zte:cgsl_main:perl-locale-maketext-simple, p-cpe:/a:zte:cgsl_main:perl-memoize, p-cpe:/a:zte:cgsl_main:perl-devel-selfstubber, p-cpe:/a:zte:cgsl_main:perl-tests, p-cpe:/a:zte:cgsl_main:perl-net-ping, p-cpe:/a:zte:cgsl_main:perl-time-piece-debuginfo, p-cpe:/a:zte:cgsl_main:perl-libs, p-cpe:/a:zte:cgsl_main:perl-selfloader, p-cpe:/a:zte:cgsl_main:perl-libs-debuginfo, p-cpe:/a:zte:cgsl_main:perl-interpreter-debuginfo, p-cpe:/a:zte:cgsl_main:perl-devel-peek-debuginfo, p-cpe:/a:zte:cgsl_main:perl-io-zlib, p-cpe:/a:zte:cgsl_main:perl-debugsource, p-cpe:/a:zte:cgsl_main:perl-errno, p-cpe:/a:zte:cgsl_main:perl-io, p-cpe:/a:zte:cgsl_main:perl, p-cpe:/a:zte:cgsl_main:perl-debuginfo, p-cpe:/a:zte:cgsl_main:perl-module-loaded, p-cpe:/a:zte:cgsl_main:perl-libnetcfg
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/24/2021
Vulnerability Publication Date: 6/2/2020
CVE: CVE-2020-10543, CVE-2020-10878
IAVA: 2020-A-0268, 2021-A-0030, 2021-A-0328