Language:
https://alas.aws.amazon.com/AL2023/ALAS-2023-117.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3234.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3235.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3256.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3278.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3296.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3297.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3324.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3352.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3491.html
https://alas.aws.amazon.com/cve/html/CVE-2022-47024.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0051.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0054.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0288.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0433.html
Severity: High
ID: 173104
File Name: al2023_ALAS2023-2023-117.nasl
Version: 1.3
Type: local
Agent: unix
Published: 3/21/2023
Updated: 5/11/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-0512
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:vim-filesystem, p-cpe:/a:amazon:linux:vim-data, p-cpe:/a:amazon:linux:vim-enhanced-debuginfo, p-cpe:/a:amazon:linux:vim-common, p-cpe:/a:amazon:linux:vim-minimal-debuginfo, p-cpe:/a:amazon:linux:vim-minimal, p-cpe:/a:amazon:linux:vim-common-debuginfo, p-cpe:/a:amazon:linux:vim-enhanced, p-cpe:/a:amazon:linux:vim-default-editor, p-cpe:/a:amazon:linux:vim-debuginfo, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:vim-debugsource
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/6/2023
Vulnerability Publication Date: 9/17/2022
CVE: CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3491, CVE-2022-47024, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512
IAVB: 2023-B-0018-S