https://alas.aws.amazon.com/AL2022/ALAS-2022-014.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4019.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4069.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4136.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4166.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4173.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4187.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4192.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4193.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0128.html
Severity: High
ID: 212465
File Name: al2022_ALAS2022-2022-014.nasl
Version: 1.1
Type: local
Agent: unix
Published: 12/11/2024
Updated: 12/11/2024
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-0128
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:vim-filesystem, p-cpe:/a:amazon:linux:vim-data, p-cpe:/a:amazon:linux:vim-x11, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:vim-enhanced-debuginfo, p-cpe:/a:amazon:linux:vim-common, p-cpe:/a:amazon:linux:vim-minimal-debuginfo, p-cpe:/a:amazon:linux:vim-x11-debuginfo, p-cpe:/a:amazon:linux:vim-minimal, p-cpe:/a:amazon:linux:vim-common-debuginfo, p-cpe:/a:amazon:linux:vim-enhanced, p-cpe:/a:amazon:linux:vim-default-editor, p-cpe:/a:amazon:linux:vim-debuginfo, p-cpe:/a:amazon:linux:vim-debugsource
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: No known exploits are available
Patch Publication Date: 1/25/2022
Vulnerability Publication Date: 12/1/2021
CVE: CVE-2021-4019, CVE-2021-4069, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4192, CVE-2021-4193, CVE-2022-0128, CVE-2022-0156, CVE-2022-0158