Language:
https://alas.aws.amazon.com/AL2023/ALAS-2023-393.html
Severity: High
ID: 183347
File Name: al2023_ALAS2023-2023-393.nasl
Version: 1.5
Type: local
Agent: unix
Published: 10/19/2023
Updated: 5/10/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2023-44487
Risk Factor: High
Base Score: 7.5
Temporal Score: 7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:nginx-core, p-cpe:/a:amazon:linux:nginx-mod-mail, p-cpe:/a:amazon:linux:nginx-debugsource, p-cpe:/a:amazon:linux:nginx-mod-http-xslt-filter-debuginfo, p-cpe:/a:amazon:linux:nginx-mod-http-xslt-filter, p-cpe:/a:amazon:linux:nginx-debuginfo, p-cpe:/a:amazon:linux:nginx-filesystem, p-cpe:/a:amazon:linux:nginx-mod-http-perl-debuginfo, p-cpe:/a:amazon:linux:nginx-core-debuginfo, p-cpe:/a:amazon:linux:nginx-mod-stream-debuginfo, p-cpe:/a:amazon:linux:nginx, p-cpe:/a:amazon:linux:nginx-mod-http-perl, p-cpe:/a:amazon:linux:nginx-mod-stream, p-cpe:/a:amazon:linux:nginx-mod-mail-debuginfo, p-cpe:/a:amazon:linux:nginx-all-modules, p-cpe:/a:amazon:linux:nginx-mod-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:nginx-mod-http-image-filter-debuginfo, p-cpe:/a:amazon:linux:nginx-mod-http-image-filter
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/16/2023
Vulnerability Publication Date: 10/10/2023
CISA Known Exploited Vulnerability Due Dates: 10/31/2023
CVE: CVE-2023-44487
IAVB: 2023-B-0083-S