Language:
https://bugzilla.suse.com/1142649
https://bugzilla.suse.com/1161913
https://bugzilla.suse.com/1177947
https://bugzilla.suse.com/1178675
https://bugzilla.suse.com/1185395
Severity: Medium
ID: 161970
File Name: suse_SU-2022-2015-1.nasl
Version: 1.6
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/9/2022
Updated: 7/14/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2019-14250
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:libgcj48-devel, p-cpe:/a:novell:suse_linux:libasan0, p-cpe:/a:novell:suse_linux:gcc48-locale, p-cpe:/a:novell:suse_linux:libstdc%2b%2b48-devel, p-cpe:/a:novell:suse_linux:libgcj48-jar, p-cpe:/a:novell:suse_linux:libasan0-32bit, p-cpe:/a:novell:suse_linux:gcc48-c%2b%2b, p-cpe:/a:novell:suse_linux:libstdc%2b%2b48-devel-32bit, p-cpe:/a:novell:suse_linux:libgcj48, p-cpe:/a:novell:suse_linux:gcc48-gij-32bit, p-cpe:/a:novell:suse_linux:gcc48-info, p-cpe:/a:novell:suse_linux:cpp48, p-cpe:/a:novell:suse_linux:gcc48-gij, p-cpe:/a:novell:suse_linux:gcc48, p-cpe:/a:novell:suse_linux:libgcj48-32bit, p-cpe:/a:novell:suse_linux:gcc48-obj-c%2b%2b, p-cpe:/a:novell:suse_linux:libada48, p-cpe:/a:novell:suse_linux:gcc48-32bit, p-cpe:/a:novell:suse_linux:gcc48-objc, p-cpe:/a:novell:suse_linux:gcc48-java, p-cpe:/a:novell:suse_linux:libgcj_bc1, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:gcc48-fortran, p-cpe:/a:novell:suse_linux:libffi48-devel, p-cpe:/a:novell:suse_linux:gcc48-objc-32bit, p-cpe:/a:novell:suse_linux:gcc48-ada
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/8/2022
Vulnerability Publication Date: 7/24/2019
CVE: CVE-2019-14250
SuSE: SUSE-SU-2022:2015-1