Language:
https://kojihub.stream.centos.org/koji/buildinfo?buildID=27150
Severity: Medium
ID: 191287
File Name: centos9_bind-9_16_23-7.nasl
Version: 1.2
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 2/29/2024
Updated: 4/26/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4
Temporal Score: 3
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS Score Source: CVE-2021-25220
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:bind-license, p-cpe:/a:centos:centos:bind-dnssec-doc, p-cpe:/a:centos:centos:bind-utils, cpe:/a:centos:centos:9, p-cpe:/a:centos:centos:bind-dnssec-utils, p-cpe:/a:centos:centos:python3-bind, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, p-cpe:/a:centos:centos:bind-libs, p-cpe:/a:centos:centos:bind-doc
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/22/2022
Vulnerability Publication Date: 3/16/2022
CVE: CVE-2021-25220, CVE-2022-0396, CVE-2022-2795, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178
IAVA: 2022-A-0122-S, 2022-A-0387-S, 2023-A-0500-S