https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2262169
https://access.redhat.com/errata/RHSA-2024:3044
http://www.nessus.org/u?99ff6172
https://issues.redhat.com/browse/RHEL-10495
https://issues.redhat.com/browse/RHEL-14293
https://issues.redhat.com/browse/RHEL-16936
https://issues.redhat.com/browse/RHEL-17623
https://issues.redhat.com/browse/RHEL-19672
https://issues.redhat.com/browse/RHEL-22313
https://issues.redhat.com/browse/RHEL-4874
https://issues.redhat.com/browse/RHEL-4964
https://issues.redhat.com/browse/RHEL-4965
Severity: Medium
ID: 210488
File Name: redhat-RHSA-2024-3044.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/7/2024
Updated: 11/7/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 2.2
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2024-1481
Risk Factor: Medium
Base Score: 5.3
Temporal Score: 4.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:bind-dyndb-ldap, p-cpe:/a:redhat:enterprise_linux:ipa-client, p-cpe:/a:redhat:enterprise_linux:ipa-server, p-cpe:/a:redhat:enterprise_linux:ipa-server-trust-ad, p-cpe:/a:redhat:enterprise_linux:ipa-server-dns, p-cpe:/a:redhat:enterprise_linux:ipa-client-common, p-cpe:/a:redhat:enterprise_linux:ipa-common, p-cpe:/a:redhat:enterprise_linux:ipa-python-compat, p-cpe:/a:redhat:enterprise_linux:ipa-server-common, p-cpe:/a:redhat:enterprise_linux:slapi-nis, p-cpe:/a:redhat:enterprise_linux:custodia, p-cpe:/a:redhat:enterprise_linux:opendnssec, p-cpe:/a:redhat:enterprise_linux:python3-custodia, p-cpe:/a:redhat:enterprise_linux:python3-ipaclient, p-cpe:/a:redhat:enterprise_linux:python3-ipalib, p-cpe:/a:redhat:enterprise_linux:python3-ipaserver, p-cpe:/a:redhat:enterprise_linux:python3-jwcrypto, p-cpe:/a:redhat:enterprise_linux:python3-kdcproxy, p-cpe:/a:redhat:enterprise_linux:python3-pyusb, p-cpe:/a:redhat:enterprise_linux:python3-qrcode, p-cpe:/a:redhat:enterprise_linux:python3-qrcode-core, p-cpe:/a:redhat:enterprise_linux:python3-yubico, p-cpe:/a:redhat:enterprise_linux:softhsm, p-cpe:/a:redhat:enterprise_linux:softhsm-devel, p-cpe:/a:redhat:enterprise_linux:ipa-client-epn, p-cpe:/a:redhat:enterprise_linux:ipa-client-samba, p-cpe:/a:redhat:enterprise_linux:ipa-healthcheck, p-cpe:/a:redhat:enterprise_linux:ipa-healthcheck-core, p-cpe:/a:redhat:enterprise_linux:ipa-selinux, p-cpe:/a:redhat:enterprise_linux:python3-ipatests, p-cpe:/a:redhat:enterprise_linux:ipa, p-cpe:/a:redhat:enterprise_linux:python-jwcrypto, p-cpe:/a:redhat:enterprise_linux:python-kdcproxy, p-cpe:/a:redhat:enterprise_linux:python-qrcode, p-cpe:/a:redhat:enterprise_linux:python-yubico, p-cpe:/a:redhat:enterprise_linux:pyusb
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/22/2024
Vulnerability Publication Date: 2/26/2024
CVE: CVE-2024-1481