Language:
http://www.nessus.org/u?442c9c85
https://access.redhat.com/security/updates/classification/#low
https://bugzilla.redhat.com/show_bug.cgi?id=622713
https://bugzilla.redhat.com/show_bug.cgi?id=622867
https://bugzilla.redhat.com/show_bug.cgi?id=656329
https://bugzilla.redhat.com/show_bug.cgi?id=656333
https://bugzilla.redhat.com/show_bug.cgi?id=656337
https://bugzilla.redhat.com/show_bug.cgi?id=656338
https://bugzilla.redhat.com/show_bug.cgi?id=656342
https://bugzilla.redhat.com/show_bug.cgi?id=656344
https://bugzilla.redhat.com/show_bug.cgi?id=656347
https://bugzilla.redhat.com/show_bug.cgi?id=656391
https://bugzilla.redhat.com/show_bug.cgi?id=656397
https://bugzilla.redhat.com/show_bug.cgi?id=661842
https://bugzilla.redhat.com/show_bug.cgi?id=661845
https://bugzilla.redhat.com/show_bug.cgi?id=661901
https://bugzilla.redhat.com/show_bug.cgi?id=664019
https://bugzilla.redhat.com/show_bug.cgi?id=668890
https://bugzilla.redhat.com/show_bug.cgi?id=669460
https://bugzilla.redhat.com/show_bug.cgi?id=669461
https://bugzilla.redhat.com/show_bug.cgi?id=669462
https://bugzilla.redhat.com/show_bug.cgi?id=669499
https://bugzilla.redhat.com/show_bug.cgi?id=669819
https://bugzilla.redhat.com/show_bug.cgi?id=670228
https://bugzilla.redhat.com/show_bug.cgi?id=673174
Severity: Medium
ID: 54595
File Name: redhat-RHSA-2011-0568.nasl
Version: 1.20
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/20/2011
Updated: 3/20/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Low
Score: 3.8
Vendor Severity: Low
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2010-4647
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 5.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:eclipse-cdt, p-cpe:/a:redhat:enterprise_linux:eclipse-emf, p-cpe:/a:redhat:enterprise_linux:icu4j-javadoc, p-cpe:/a:redhat:enterprise_linux:eclipse-gef-examples, p-cpe:/a:redhat:enterprise_linux:eclipse-rse, p-cpe:/a:redhat:enterprise_linux:eclipse-emf-xsd-sdk, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-wikitext, p-cpe:/a:redhat:enterprise_linux:icu4j, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-trac, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-pde, p-cpe:/a:redhat:enterprise_linux:sat4j, p-cpe:/a:redhat:enterprise_linux:eclipse-emf-examples, p-cpe:/a:redhat:enterprise_linux:eclipse-emf-xsd, p-cpe:/a:redhat:enterprise_linux:eclipse, p-cpe:/a:redhat:enterprise_linux:eclipse-swt, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-webtasks, p-cpe:/a:redhat:enterprise_linux:objectweb-asm, p-cpe:/a:redhat:enterprise_linux:eclipse-changelog, p-cpe:/a:redhat:enterprise_linux:eclipse-jdt, p-cpe:/a:redhat:enterprise_linux:icu4j-eclipse, p-cpe:/a:redhat:enterprise_linux:eclipse-oprofile, p-cpe:/a:redhat:enterprise_linux:jetty-eclipse, p-cpe:/a:redhat:enterprise_linux:eclipse-dtp, p-cpe:/a:redhat:enterprise_linux:eclipse-rcp, p-cpe:/a:redhat:enterprise_linux:eclipse-gef-sdk, p-cpe:/a:redhat:enterprise_linux:eclipse-gef, p-cpe:/a:redhat:enterprise_linux:eclipse-callgraph, p-cpe:/a:redhat:enterprise_linux:eclipse-cdt-parsers, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn, p-cpe:/a:redhat:enterprise_linux:eclipse-birt, p-cpe:/a:redhat:enterprise_linux:eclipse-emf-sdk, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-cdt, p-cpe:/a:redhat:enterprise_linux:eclipse-platform, p-cpe:/a:redhat:enterprise_linux:eclipse-cdt-sdk, p-cpe:/a:redhat:enterprise_linux:eclipse-mylyn-java, p-cpe:/a:redhat:enterprise_linux:eclipse-pde, p-cpe:/a:redhat:enterprise_linux:eclipse-valgrind, p-cpe:/a:redhat:enterprise_linux:objectweb-asm-javadoc, p-cpe:/a:redhat:enterprise_linux:eclipse-linuxprofilingframework
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/19/2011
Vulnerability Publication Date: 1/13/2011
CVE: CVE-2010-4647
BID: 44883