Language:
https://alas.aws.amazon.com/AL2022/ALAS-2022-166.html
Severity: Medium
ID: 167020
File Name: al2022_ALAS2022-2022-166.nasl
Version: 1.4
Type: local
Agent: unix
Published: 11/5/2022
Updated: 11/29/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4
Temporal Score: 3
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS Score Source: CVE-2021-25220
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:bind-pkcs11-devel, p-cpe:/a:amazon:linux:bind-dlz-filesystem-debuginfo, p-cpe:/a:amazon:linux:bind-debugsource, p-cpe:/a:amazon:linux:bind-debuginfo, p-cpe:/a:amazon:linux:bind-pkcs11-libs, p-cpe:/a:amazon:linux:bind-dnssec-utils, p-cpe:/a:amazon:linux:bind-license, p-cpe:/a:amazon:linux:bind-pkcs11-debuginfo, p-cpe:/a:amazon:linux:bind-utils, p-cpe:/a:amazon:linux:bind-doc, p-cpe:/a:amazon:linux:bind-pkcs11-utils, p-cpe:/a:amazon:linux:bind-utils-debuginfo, p-cpe:/a:amazon:linux:bind-dlz-ldap, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:python3-bind, p-cpe:/a:amazon:linux:bind-devel, p-cpe:/a:amazon:linux:bind-dnssec-utils-debuginfo, p-cpe:/a:amazon:linux:bind-pkcs11, p-cpe:/a:amazon:linux:bind-dlz-filesystem, p-cpe:/a:amazon:linux:bind-dlz-sqlite3, p-cpe:/a:amazon:linux:bind-pkcs11-utils-debuginfo, p-cpe:/a:amazon:linux:bind-dnssec-doc, p-cpe:/a:amazon:linux:bind-dlz-mysql, p-cpe:/a:amazon:linux:bind-libs, p-cpe:/a:amazon:linux:bind-libs-debuginfo, p-cpe:/a:amazon:linux:bind-pkcs11-libs-debuginfo, p-cpe:/a:amazon:linux:bind-dlz-ldap-debuginfo, p-cpe:/a:amazon:linux:bind-chroot, p-cpe:/a:amazon:linux:bind-dlz-mysql-debuginfo, p-cpe:/a:amazon:linux:bind-dlz-sqlite3-debuginfo, p-cpe:/a:amazon:linux:bind
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 11/1/2022
Vulnerability Publication Date: 3/16/2022
CVE: CVE-2021-25220, CVE-2022-0396
IAVA: 2022-A-0122-S