http://security.gd-linux.com/notice/NS-SA-2022-0019
Severity: Critical
ID: 160739
File Name: newstart_cgsl_NS-SA-2022-0019_gcc.nasl
Version: 1.2
Type: local
Published: 5/9/2022
Updated: 5/9/2022
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2014-5044
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_core:cpp, p-cpe:/a:zte:cgsl_core:gcc, p-cpe:/a:zte:cgsl_core:gcc-base-debuginfo, p-cpe:/a:zte:cgsl_core:gcc-c%2b%2b, p-cpe:/a:zte:cgsl_core:libgfortran, p-cpe:/a:zte:cgsl_core:libgfortran-static, p-cpe:/a:zte:cgsl_core:libgnat, p-cpe:/a:zte:cgsl_core:libgnat-devel, p-cpe:/a:zte:cgsl_core:libgnat-static, p-cpe:/a:zte:cgsl_core:libgo, p-cpe:/a:zte:cgsl_core:libgo-devel, p-cpe:/a:zte:cgsl_core:libgo-static, p-cpe:/a:zte:cgsl_core:libgomp, p-cpe:/a:zte:cgsl_core:libitm, p-cpe:/a:zte:cgsl_core:libitm-devel, p-cpe:/a:zte:cgsl_core:libitm-static, p-cpe:/a:zte:cgsl_core:libmudflap, p-cpe:/a:zte:cgsl_core:libmudflap-devel, p-cpe:/a:zte:cgsl_core:libmudflap-static, p-cpe:/a:zte:cgsl_core:libobjc, p-cpe:/a:zte:cgsl_core:gcc-debuginfo, p-cpe:/a:zte:cgsl_core:gcc-gfortran, p-cpe:/a:zte:cgsl_core:gcc-gnat, p-cpe:/a:zte:cgsl_core:gcc-go, p-cpe:/a:zte:cgsl_core:gcc-objc, p-cpe:/a:zte:cgsl_core:gcc-objc%2b%2b, p-cpe:/a:zte:cgsl_core:gcc-plugin-devel, p-cpe:/a:zte:cgsl_core:libasan, p-cpe:/a:zte:cgsl_core:libasan-static, p-cpe:/a:zte:cgsl_core:libatomic, p-cpe:/a:zte:cgsl_core:libatomic-static, p-cpe:/a:zte:cgsl_core:libgcc, p-cpe:/a:zte:cgsl_main:cpp, p-cpe:/a:zte:cgsl_main:gcc, p-cpe:/a:zte:cgsl_main:gcc-base-debuginfo, p-cpe:/a:zte:cgsl_main:gcc-c%2b%2b, p-cpe:/a:zte:cgsl_main:gcc-debuginfo, p-cpe:/a:zte:cgsl_main:gcc-gfortran, p-cpe:/a:zte:cgsl_main:gcc-gnat, p-cpe:/a:zte:cgsl_main:gcc-go, p-cpe:/a:zte:cgsl_main:gcc-objc, p-cpe:/a:zte:cgsl_main:gcc-objc%2b%2b, p-cpe:/a:zte:cgsl_main:gcc-plugin-devel, p-cpe:/a:zte:cgsl_main:libasan, p-cpe:/a:zte:cgsl_main:libasan-static, p-cpe:/a:zte:cgsl_main:libatomic, p-cpe:/a:zte:cgsl_core:libquadmath, p-cpe:/a:zte:cgsl_core:libquadmath-devel, p-cpe:/a:zte:cgsl_core:libquadmath-static, p-cpe:/a:zte:cgsl_core:libstdc%2b%2b, p-cpe:/a:zte:cgsl_core:libstdc%2b%2b-devel, p-cpe:/a:zte:cgsl_core:libstdc%2b%2b-docs, p-cpe:/a:zte:cgsl_core:libstdc%2b%2b-static, p-cpe:/a:zte:cgsl_core:libtsan, p-cpe:/a:zte:cgsl_core:libtsan-static, p-cpe:/a:zte:cgsl_main:libatomic-static, p-cpe:/a:zte:cgsl_main:libgcc, p-cpe:/a:zte:cgsl_main:libgfortran, p-cpe:/a:zte:cgsl_main:libgfortran-static, p-cpe:/a:zte:cgsl_main:libgnat, p-cpe:/a:zte:cgsl_main:libgnat-devel, p-cpe:/a:zte:cgsl_main:libgnat-static, p-cpe:/a:zte:cgsl_main:libgo, p-cpe:/a:zte:cgsl_main:libgo-devel, p-cpe:/a:zte:cgsl_main:libgo-static, p-cpe:/a:zte:cgsl_main:libgomp, p-cpe:/a:zte:cgsl_main:libitm, p-cpe:/a:zte:cgsl_main:libitm-devel, p-cpe:/a:zte:cgsl_main:libitm-static, p-cpe:/a:zte:cgsl_main:libmudflap, p-cpe:/a:zte:cgsl_main:libmudflap-devel, p-cpe:/a:zte:cgsl_main:libmudflap-static, p-cpe:/a:zte:cgsl_main:libobjc, p-cpe:/a:zte:cgsl_main:libquadmath, p-cpe:/a:zte:cgsl_main:libquadmath-devel, p-cpe:/a:zte:cgsl_main:libquadmath-static, p-cpe:/a:zte:cgsl_main:libstdc%2b%2b, p-cpe:/a:zte:cgsl_main:libstdc%2b%2b-devel, p-cpe:/a:zte:cgsl_main:libstdc%2b%2b-docs, p-cpe:/a:zte:cgsl_main:libstdc%2b%2b-static, p-cpe:/a:zte:cgsl_main:libtsan, p-cpe:/a:zte:cgsl_main:libtsan-static, cpe:/o:zte:cgsl_core:5, cpe:/o:zte:cgsl_main:5
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 5/8/2022
Vulnerability Publication Date: 6/17/2014
CVE: CVE-2014-5044, CVE-2015-5276