Language:
http://www.nessus.org/u?2deb0ebe
https://access.redhat.com/security/updates/classification/#important
Severity: High
ID: 164874
File Name: redhat-RHSA-2022-4795.nasl
Version: 1.7
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 9/8/2022
Updated: 11/7/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Important
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-24903
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:rsyslog-pgsql, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmkubernetes, p-cpe:/a:redhat:enterprise_linux:rsyslog, p-cpe:/a:redhat:enterprise_linux:rsyslog-udpspoof, p-cpe:/a:redhat:enterprise_linux:rsyslog-gnutls, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmfields, p-cpe:/a:redhat:enterprise_linux:rsyslog-openssl, p-cpe:/a:redhat:enterprise_linux:rsyslog-logrotate, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmaudit, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:rsyslog-mysql, cpe:/o:redhat:rhel_eus:9.0, p-cpe:/a:redhat:enterprise_linux:rsyslog-crypto, p-cpe:/a:redhat:enterprise_linux:rsyslog-doc, p-cpe:/a:redhat:enterprise_linux:rsyslog-elasticsearch, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmnormalize, p-cpe:/a:redhat:enterprise_linux:rsyslog-kafka, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmjsonparse, p-cpe:/a:redhat:enterprise_linux:rsyslog-gssapi, p-cpe:/a:redhat:enterprise_linux:rsyslog-snmp, p-cpe:/a:redhat:enterprise_linux:rsyslog-relp, p-cpe:/a:redhat:enterprise_linux:rsyslog-mmsnmptrapd, p-cpe:/a:redhat:enterprise_linux:rsyslog-omamqp1
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 5/30/2022
Vulnerability Publication Date: 5/6/2022
CVE: CVE-2022-24903