Language:
https://access.redhat.com/security/updates/classification/#moderate
http://www.nessus.org/u?3c016032
https://bugzilla.redhat.com/show_bug.cgi?id=1470033
https://bugzilla.redhat.com/show_bug.cgi?id=1477663
https://bugzilla.redhat.com/show_bug.cgi?id=1488058
https://bugzilla.redhat.com/show_bug.cgi?id=1502860
https://bugzilla.redhat.com/show_bug.cgi?id=1504052
https://bugzilla.redhat.com/show_bug.cgi?id=1506038
https://bugzilla.redhat.com/show_bug.cgi?id=1508867
https://bugzilla.redhat.com/show_bug.cgi?id=1511988
https://bugzilla.redhat.com/show_bug.cgi?id=1513497
https://bugzilla.redhat.com/show_bug.cgi?id=1513502
https://bugzilla.redhat.com/show_bug.cgi?id=1518605
https://bugzilla.redhat.com/show_bug.cgi?id=1518662
https://bugzilla.redhat.com/show_bug.cgi?id=1520453
https://bugzilla.redhat.com/show_bug.cgi?id=1527205
https://bugzilla.redhat.com/show_bug.cgi?id=1528632
https://bugzilla.redhat.com/show_bug.cgi?id=1533204
https://bugzilla.redhat.com/show_bug.cgi?id=1533271
https://bugzilla.redhat.com/show_bug.cgi?id=1533511
https://bugzilla.redhat.com/show_bug.cgi?id=1534442
https://bugzilla.redhat.com/show_bug.cgi?id=1537606
https://bugzilla.redhat.com/show_bug.cgi?id=1539961
https://bugzilla.redhat.com/show_bug.cgi?id=1547146
https://bugzilla.redhat.com/show_bug.cgi?id=1547539
https://bugzilla.redhat.com/show_bug.cgi?id=1549139
https://bugzilla.redhat.com/show_bug.cgi?id=1550934
https://bugzilla.redhat.com/show_bug.cgi?id=1551182
https://bugzilla.redhat.com/show_bug.cgi?id=1552759
https://bugzilla.redhat.com/show_bug.cgi?id=1556720
https://bugzilla.redhat.com/show_bug.cgi?id=1557328
https://bugzilla.redhat.com/show_bug.cgi?id=1558679
https://bugzilla.redhat.com/show_bug.cgi?id=1559151
https://bugzilla.redhat.com/show_bug.cgi?id=1559920
https://bugzilla.redhat.com/show_bug.cgi?id=1560937
https://bugzilla.redhat.com/show_bug.cgi?id=1562148
https://bugzilla.redhat.com/show_bug.cgi?id=1570147
https://bugzilla.redhat.com/show_bug.cgi?id=1571435
https://bugzilla.redhat.com/show_bug.cgi?id=1571646
https://bugzilla.redhat.com/show_bug.cgi?id=1571744
https://bugzilla.redhat.com/show_bug.cgi?id=1572353
https://bugzilla.redhat.com/show_bug.cgi?id=1572667
https://bugzilla.redhat.com/show_bug.cgi?id=1573583
https://bugzilla.redhat.com/show_bug.cgi?id=1573791
https://bugzilla.redhat.com/show_bug.cgi?id=1573808
https://bugzilla.redhat.com/show_bug.cgi?id=1576751
https://bugzilla.redhat.com/show_bug.cgi?id=1579023
https://bugzilla.redhat.com/show_bug.cgi?id=1582597
https://bugzilla.redhat.com/show_bug.cgi?id=1582645
https://bugzilla.redhat.com/show_bug.cgi?id=1583792
https://bugzilla.redhat.com/show_bug.cgi?id=1583858
https://bugzilla.redhat.com/show_bug.cgi?id=1584279
https://bugzilla.redhat.com/show_bug.cgi?id=1584374
https://bugzilla.redhat.com/show_bug.cgi?id=1584396
https://bugzilla.redhat.com/show_bug.cgi?id=1584403
https://bugzilla.redhat.com/show_bug.cgi?id=1584404
https://bugzilla.redhat.com/show_bug.cgi?id=1584411
https://bugzilla.redhat.com/show_bug.cgi?id=1584416
https://bugzilla.redhat.com/show_bug.cgi?id=1584417
https://bugzilla.redhat.com/show_bug.cgi?id=1584754
https://bugzilla.redhat.com/show_bug.cgi?id=1585189
https://bugzilla.redhat.com/show_bug.cgi?id=1585362
https://bugzilla.redhat.com/show_bug.cgi?id=1586155
https://bugzilla.redhat.com/show_bug.cgi?id=1589951
https://bugzilla.redhat.com/show_bug.cgi?id=1590030
https://bugzilla.redhat.com/show_bug.cgi?id=1590031
https://bugzilla.redhat.com/show_bug.cgi?id=1590033
https://bugzilla.redhat.com/show_bug.cgi?id=1590368
https://bugzilla.redhat.com/show_bug.cgi?id=1590586
https://bugzilla.redhat.com/show_bug.cgi?id=1590607
https://bugzilla.redhat.com/show_bug.cgi?id=1590612
https://bugzilla.redhat.com/show_bug.cgi?id=1590613
https://bugzilla.redhat.com/show_bug.cgi?id=1590953
https://bugzilla.redhat.com/show_bug.cgi?id=1591782
https://bugzilla.redhat.com/show_bug.cgi?id=1592418
https://bugzilla.redhat.com/show_bug.cgi?id=1592963
https://bugzilla.redhat.com/show_bug.cgi?id=1592967
https://bugzilla.redhat.com/show_bug.cgi?id=1596760
https://bugzilla.redhat.com/show_bug.cgi?id=1597313
https://bugzilla.redhat.com/show_bug.cgi?id=1597972
https://bugzilla.redhat.com/show_bug.cgi?id=1599410
https://bugzilla.redhat.com/show_bug.cgi?id=1599883
https://bugzilla.redhat.com/show_bug.cgi?id=1600038
https://bugzilla.redhat.com/show_bug.cgi?id=1601348
https://bugzilla.redhat.com/show_bug.cgi?id=1607143
https://bugzilla.redhat.com/show_bug.cgi?id=1608450
Severity: High
ID: 194080
File Name: redhat-RHSA-2018-2331.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/27/2024
Updated: 6/3/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2018-1000115
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:python-novajoin, p-cpe:/a:redhat:enterprise_linux:puppet-manila, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-heat-templates, p-cpe:/a:redhat:enterprise_linux:puppet-ceilometer, p-cpe:/a:redhat:enterprise_linux:puppet-panko, p-cpe:/a:redhat:enterprise_linux:puppet-tripleo, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-devtools, p-cpe:/a:redhat:enterprise_linux:instack-undercloud, p-cpe:/a:redhat:enterprise_linux:puppet-heat, p-cpe:/a:redhat:enterprise_linux:puppet-aodh, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-container-base, p-cpe:/a:redhat:enterprise_linux:puppet-ceph, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-puppet-elements, p-cpe:/a:redhat:enterprise_linux:puppet-nova, p-cpe:/a:redhat:enterprise_linux:puppet-cinder, p-cpe:/a:redhat:enterprise_linux:puppet-trove, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-image-elements, p-cpe:/a:redhat:enterprise_linux:python-os-brick, p-cpe:/a:redhat:enterprise_linux:python-tripleoclient, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common, p-cpe:/a:redhat:enterprise_linux:os-net-config, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-containers, p-cpe:/a:redhat:enterprise_linux:puppet-mistral, p-cpe:/a:redhat:enterprise_linux:puppet-neutron, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:puppet-keystone, p-cpe:/a:redhat:enterprise_linux:puppet-ironic, p-cpe:/a:redhat:enterprise_linux:puppet-glance
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/20/2018
Vulnerability Publication Date: 3/5/2018
CVE: CVE-2018-1000115
RHSA: 2018:2331