Language:
https://access.redhat.com/security/updates/classification/#moderate
http://www.nessus.org/u?67615582
https://bugzilla.redhat.com/show_bug.cgi?id=1362183
https://bugzilla.redhat.com/show_bug.cgi?id=1362190
https://bugzilla.redhat.com/show_bug.cgi?id=1362199
https://bugzilla.redhat.com/show_bug.cgi?id=1373229
https://bugzilla.redhat.com/show_bug.cgi?id=1375906
https://bugzilla.redhat.com/show_bug.cgi?id=1388370
https://bugzilla.redhat.com/show_bug.cgi?id=1388371
https://bugzilla.redhat.com/show_bug.cgi?id=1388377
https://bugzilla.redhat.com/show_bug.cgi?id=1388378
https://bugzilla.redhat.com/show_bug.cgi?id=1388379
https://bugzilla.redhat.com/show_bug.cgi?id=1388382
https://bugzilla.redhat.com/show_bug.cgi?id=1388385
https://bugzilla.redhat.com/show_bug.cgi?id=1388386
https://bugzilla.redhat.com/show_bug.cgi?id=1388388
https://bugzilla.redhat.com/show_bug.cgi?id=1388390
https://bugzilla.redhat.com/show_bug.cgi?id=1388392
https://bugzilla.redhat.com/show_bug.cgi?id=1406712
https://bugzilla.redhat.com/show_bug.cgi?id=1439190
https://bugzilla.redhat.com/show_bug.cgi?id=1478309
https://bugzilla.redhat.com/show_bug.cgi?id=1478310
https://bugzilla.redhat.com/show_bug.cgi?id=1495541
https://bugzilla.redhat.com/show_bug.cgi?id=1503705
https://bugzilla.redhat.com/show_bug.cgi?id=1515757
https://bugzilla.redhat.com/show_bug.cgi?id=1515760
https://bugzilla.redhat.com/show_bug.cgi?id=1518737
https://bugzilla.redhat.com/show_bug.cgi?id=1537125
https://bugzilla.redhat.com/show_bug.cgi?id=1540167
https://bugzilla.redhat.com/show_bug.cgi?id=1552628
https://bugzilla.redhat.com/show_bug.cgi?id=1552631
https://bugzilla.redhat.com/show_bug.cgi?id=1553398
https://bugzilla.redhat.com/show_bug.cgi?id=1558450
https://bugzilla.redhat.com/show_bug.cgi?id=1560395
https://bugzilla.redhat.com/show_bug.cgi?id=1560399
https://bugzilla.redhat.com/show_bug.cgi?id=1560599
https://bugzilla.redhat.com/show_bug.cgi?id=1560614
https://bugzilla.redhat.com/show_bug.cgi?id=1560634
https://bugzilla.redhat.com/show_bug.cgi?id=1560643
https://bugzilla.redhat.com/show_bug.cgi?id=1575536
https://bugzilla.redhat.com/show_bug.cgi?id=1605048
https://bugzilla.redhat.com/show_bug.cgi?id=1622707
https://bugzilla.redhat.com/show_bug.cgi?id=1628389
https://bugzilla.redhat.com/show_bug.cgi?id=1633260
https://bugzilla.redhat.com/show_bug.cgi?id=1633399
https://bugzilla.redhat.com/show_bug.cgi?id=1634830
https://bugzilla.redhat.com/show_bug.cgi?id=1640722
https://bugzilla.redhat.com/show_bug.cgi?id=1646937
https://bugzilla.redhat.com/show_bug.cgi?id=1648928
Severity: Critical
ID: 194113
File Name: redhat-RHSA-2018-3558.nasl
Version: 1.0
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/27/2024
Updated: 4/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Moderate
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2018-14618
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:httpd24-curl, p-cpe:/a:redhat:enterprise_linux:httpd24-mod_md, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:httpd24-httpd-manual, p-cpe:/a:redhat:enterprise_linux:httpd24-libcurl, p-cpe:/a:redhat:enterprise_linux:httpd24-mod_ldap, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:httpd24-libnghttp2-devel, p-cpe:/a:redhat:enterprise_linux:httpd24-httpd-devel, p-cpe:/a:redhat:enterprise_linux:httpd24-mod_session, p-cpe:/a:redhat:enterprise_linux:httpd24-mod_ssl, p-cpe:/a:redhat:enterprise_linux:httpd24-mod_proxy_html, p-cpe:/a:redhat:enterprise_linux:httpd24-nghttp2, p-cpe:/a:redhat:enterprise_linux:httpd24-libcurl-devel, p-cpe:/a:redhat:enterprise_linux:httpd24-libnghttp2, p-cpe:/a:redhat:enterprise_linux:httpd24-httpd-tools, p-cpe:/a:redhat:enterprise_linux:httpd24-httpd
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/13/2018
Vulnerability Publication Date: 8/3/2016
CVE: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254, CVE-2017-1000257, CVE-2017-15710, CVE-2017-15715, CVE-2017-7407, CVE-2017-8816, CVE-2017-8817, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301, CVE-2018-11763, CVE-2018-1283, CVE-2018-1301, CVE-2018-1303, CVE-2018-1312, CVE-2018-1333, CVE-2018-14618