Language:
https://kojihub.stream.centos.org/koji/buildinfo?buildID=30641
Severity: High
ID: 191422
File Name: centos9_bind-9_16_23-9.nasl
Version: 1.1
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 2/29/2024
Updated: 4/26/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Low
Score: 3.6
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2022-3924
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:bind-license, p-cpe:/a:centos:centos:bind-dnssec-doc, p-cpe:/a:centos:centos:bind-utils, cpe:/a:centos:centos:9, p-cpe:/a:centos:centos:bind-dnssec-utils, p-cpe:/a:centos:centos:python3-bind, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, p-cpe:/a:centos:centos:bind-libs, p-cpe:/a:centos:centos:bind-doc
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 2/20/2023
Vulnerability Publication Date: 1/25/2023
CVE: CVE-2022-3094, CVE-2022-3736, CVE-2022-3924
IAVA: 2023-A-0058-S