https://access.redhat.com/security/cve/cve-2006-4253
https://access.redhat.com/security/cve/cve-2006-4340
https://access.redhat.com/security/cve/cve-2006-4565
https://access.redhat.com/security/cve/cve-2006-4566
https://access.redhat.com/security/cve/cve-2006-4568
https://access.redhat.com/security/cve/cve-2006-4570
Severity: Critical
ID: 22358
File Name: redhat-RHSA-2006-0676.nasl
Version: 1.33
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 9/15/2006
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:devhelp, p-cpe:/a:redhat:enterprise_linux:devhelp-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/15/2006
Vulnerability Publication Date: 8/21/2006
CVE: CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4570, CVE-2006-4571