Severity: Critical
ID: 184859
File Name: rocky_linux_RLSA-2022-1643.nasl
Version: 1.0
Type: local
Published: 11/7/2023
Updated: 11/7/2023
Supported Sensors: Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-25235
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:xmlrpc-c-c%2b%2b, p-cpe:/a:rocky:linux:xmlrpc-c-c%2b%2b-debuginfo, p-cpe:/a:rocky:linux:xmlrpc-c-debugsource, p-cpe:/a:rocky:linux:xmlrpc-c-client, p-cpe:/a:rocky:linux:xmlrpc-c, p-cpe:/a:rocky:linux:xmlrpc-c-client%2b%2b, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:xmlrpc-c-devel, p-cpe:/a:rocky:linux:xmlrpc-c-client%2b%2b-debuginfo, p-cpe:/a:rocky:linux:xmlrpc-c-debuginfo, p-cpe:/a:rocky:linux:xmlrpc-c-client-debuginfo
Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 4/28/2022
Vulnerability Publication Date: 2/16/2022
CVE: CVE-2022-25235