Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
https://security-tracker.debian.org/tracker/source-package/curl
https://www.debian.org/security/2022/dsa-5197
https://security-tracker.debian.org/tracker/CVE-2021-22898
https://security-tracker.debian.org/tracker/CVE-2021-22924
https://security-tracker.debian.org/tracker/CVE-2021-22945
https://security-tracker.debian.org/tracker/CVE-2021-22946
https://security-tracker.debian.org/tracker/CVE-2021-22947
https://security-tracker.debian.org/tracker/CVE-2022-22576
https://security-tracker.debian.org/tracker/CVE-2022-27774
https://security-tracker.debian.org/tracker/CVE-2022-27775
https://security-tracker.debian.org/tracker/CVE-2022-27776
https://security-tracker.debian.org/tracker/CVE-2022-27781
https://security-tracker.debian.org/tracker/CVE-2022-27782
https://security-tracker.debian.org/tracker/CVE-2022-32205
https://security-tracker.debian.org/tracker/CVE-2022-32206
https://security-tracker.debian.org/tracker/CVE-2022-32207
Severity: Critical
ID: 163681
File Name: debian_DSA-5197.nasl
Version: 1.7
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 8/2/2022
Updated: 1/24/2025
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-32207
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Risk Factor: Critical
Base Score: 9.3
Threat Score: 8.9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score Source: CVE-2021-22947
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:libcurl4, p-cpe:/a:debian:debian_linux:curl, p-cpe:/a:debian:debian_linux:libcurl3-nss, p-cpe:/a:debian:debian_linux:libcurl4-gnutls-dev, p-cpe:/a:debian:debian_linux:libcurl4-doc, p-cpe:/a:debian:debian_linux:libcurl3-gnutls, p-cpe:/a:debian:debian_linux:libcurl4-nss-dev, p-cpe:/a:debian:debian_linux:libcurl4-openssl-dev
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/1/2022
Vulnerability Publication Date: 5/28/2021
CVE: CVE-2021-22898, CVE-2021-22924, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27781, CVE-2022-27782, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208
IAVA: 2022-A-0224-S, 2022-A-0255-S