Language:
https://alas.aws.amazon.com/AL2022/ALAS-2022-069.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46659.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46661.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46663.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46664.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46665.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46667.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46668.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24048.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24050.html
Severity: High
ID: 164785
File Name: al2022_ALAS2022-2022-069.nasl
Version: 1.4
Type: local
Agent: unix
Published: 9/7/2022
Updated: 12/11/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-24052
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:mariadb105-sphinx-engine, p-cpe:/a:amazon:linux:mariadb105-devel, p-cpe:/a:amazon:linux:mariadb105-server-galera, p-cpe:/a:amazon:linux:mariadb105-connect-engine, p-cpe:/a:amazon:linux:mariadb105-server-utils, p-cpe:/a:amazon:linux:mariadb105-s3-engine-debuginfo, p-cpe:/a:amazon:linux:mariadb105-connect-engine-debuginfo, p-cpe:/a:amazon:linux:mariadb105-cracklib-password-check-debuginfo, p-cpe:/a:amazon:linux:mariadb105-pam-debuginfo, p-cpe:/a:amazon:linux:mariadb105-rocksdb-engine, p-cpe:/a:amazon:linux:mariadb105-oqgraph-engine-debuginfo, p-cpe:/a:amazon:linux:mariadb105-server-debuginfo, p-cpe:/a:amazon:linux:mariadb105-pam, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:mariadb105-backup, p-cpe:/a:amazon:linux:mariadb105-oqgraph-engine, p-cpe:/a:amazon:linux:mariadb105-errmsg, p-cpe:/a:amazon:linux:mariadb105-common, p-cpe:/a:amazon:linux:mariadb105-test-debuginfo, p-cpe:/a:amazon:linux:mariadb105-embedded, p-cpe:/a:amazon:linux:mariadb105-gssapi-server, p-cpe:/a:amazon:linux:mariadb105, p-cpe:/a:amazon:linux:mariadb105-backup-debuginfo, p-cpe:/a:amazon:linux:mariadb105-gssapi-server-debuginfo, p-cpe:/a:amazon:linux:mariadb105-server-utils-debuginfo, p-cpe:/a:amazon:linux:mariadb105-debuginfo, p-cpe:/a:amazon:linux:mariadb105-server, p-cpe:/a:amazon:linux:mariadb105-rocksdb-engine-debuginfo, p-cpe:/a:amazon:linux:mariadb105-sphinx-engine-debuginfo, p-cpe:/a:amazon:linux:mariadb105-debugsource, p-cpe:/a:amazon:linux:mariadb105-embedded-debuginfo, p-cpe:/a:amazon:linux:mariadb105-cracklib-password-check, p-cpe:/a:amazon:linux:mariadb105-s3-engine, p-cpe:/a:amazon:linux:mariadb105-embedded-devel, p-cpe:/a:amazon:linux:mariadb105-test
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/18/2022
Vulnerability Publication Date: 1/29/2022
CVE: CVE-2021-46659, CVE-2021-46661, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46667, CVE-2021-46668, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052