Language:
https://bugzilla.suse.com/1175508
https://bugzilla.suse.com/1192050
https://bugzilla.suse.com/1193041
http://www.nessus.org/u?1f525b31
Severity: High
ID: 155876
File Name: openSUSE-2021-3943.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/7/2021
Updated: 11/22/2023
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.7
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-21703
Risk Factor: High
Base Score: 7
Temporal Score: 6.5
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:php7-calendar, p-cpe:/a:novell:opensuse:php7-test, p-cpe:/a:novell:opensuse:php7-sysvshm, p-cpe:/a:novell:opensuse:php7-fpm, p-cpe:/a:novell:opensuse:php7-pgsql, p-cpe:/a:novell:opensuse:php7-soap, p-cpe:/a:novell:opensuse:php7-gd, p-cpe:/a:novell:opensuse:php7-tokenizer, p-cpe:/a:novell:opensuse:php7-odbc, p-cpe:/a:novell:opensuse:php7-ldap, p-cpe:/a:novell:opensuse:php7-exif, p-cpe:/a:novell:opensuse:php7-pcntl, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:php7-firebird, p-cpe:/a:novell:opensuse:php7-xsl, p-cpe:/a:novell:opensuse:php7-sockets, p-cpe:/a:novell:opensuse:php7-mbstring, p-cpe:/a:novell:opensuse:php7-phar, p-cpe:/a:novell:opensuse:php7-ftp, p-cpe:/a:novell:opensuse:php7-intl, p-cpe:/a:novell:opensuse:php7-sodium, p-cpe:/a:novell:opensuse:php7-ctype, p-cpe:/a:novell:opensuse:php7-gettext, p-cpe:/a:novell:opensuse:php7-sysvsem, p-cpe:/a:novell:opensuse:php7-dba, p-cpe:/a:novell:opensuse:php7-posix, p-cpe:/a:novell:opensuse:php7-pdo, p-cpe:/a:novell:opensuse:php7-xmlrpc, p-cpe:/a:novell:opensuse:php7-shmop, p-cpe:/a:novell:opensuse:php7-fileinfo, p-cpe:/a:novell:opensuse:php7-sqlite, p-cpe:/a:novell:opensuse:php7-xmlreader, p-cpe:/a:novell:opensuse:php7-devel, p-cpe:/a:novell:opensuse:php7-fastcgi, p-cpe:/a:novell:opensuse:php7-enchant, p-cpe:/a:novell:opensuse:php7-iconv, p-cpe:/a:novell:opensuse:php7-dom, p-cpe:/a:novell:opensuse:php7-zip, p-cpe:/a:novell:opensuse:php7-opcache, p-cpe:/a:novell:opensuse:php7-tidy, p-cpe:/a:novell:opensuse:php7-mysql, p-cpe:/a:novell:opensuse:php7-json, p-cpe:/a:novell:opensuse:php7, p-cpe:/a:novell:opensuse:php7-zlib, p-cpe:/a:novell:opensuse:php7-bz2, p-cpe:/a:novell:opensuse:php7-sysvmsg, p-cpe:/a:novell:opensuse:apache2-mod_php7, p-cpe:/a:novell:opensuse:php7-curl, p-cpe:/a:novell:opensuse:php7-xmlwriter, p-cpe:/a:novell:opensuse:php7-gmp, p-cpe:/a:novell:opensuse:php7-embed, p-cpe:/a:novell:opensuse:php7-readline, p-cpe:/a:novell:opensuse:php7-bcmath, p-cpe:/a:novell:opensuse:php7-openssl, p-cpe:/a:novell:opensuse:php7-snmp
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/6/2021
Vulnerability Publication Date: 10/25/2021
CVE: CVE-2021-21703, CVE-2021-21707
IAVA: 2021-A-0503-S, 2021-A-0566-S