Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004935
https://security-tracker.debian.org/tracker/source-package/connman
https://www.debian.org/security/2022/dsa-5231
https://security-tracker.debian.org/tracker/CVE-2022-23096
https://security-tracker.debian.org/tracker/CVE-2022-23097
https://security-tracker.debian.org/tracker/CVE-2022-23098
https://security-tracker.debian.org/tracker/CVE-2022-32292
Severity: Critical
ID: 165255
File Name: debian_DSA-5231.nasl
Version: 1.3
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 9/20/2022
Updated: 10/11/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS Score Source: CVE-2022-23097
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2022-32292
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:connman-doc, p-cpe:/a:debian:debian_linux:connman-dev, p-cpe:/a:debian:debian_linux:connman-vpn, p-cpe:/a:debian:debian_linux:connman
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/17/2022
Vulnerability Publication Date: 1/28/2022
CVE: CVE-2022-23096, CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293