Language:
https://kojihub.stream.centos.org/koji/buildinfo?buildID=35015
Severity: High
ID: 191281
File Name: centos9_bind-9_16_23-13.nasl
Version: 1.1
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 2/29/2024
Updated: 4/26/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2023-2911
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:bind-license, p-cpe:/a:centos:centos:bind-dnssec-doc, p-cpe:/a:centos:centos:bind-utils, cpe:/a:centos:centos:9, p-cpe:/a:centos:centos:bind-dnssec-utils, p-cpe:/a:centos:centos:python3-bind, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, p-cpe:/a:centos:centos:bind-libs, p-cpe:/a:centos:centos:bind-doc
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/CentOS/release, Host/CentOS/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 7/19/2023
Vulnerability Publication Date: 6/21/2023
CVE: CVE-2023-2828, CVE-2023-2911
IAVA: 2023-A-0320-S, 2023-A-0500-S