Language:
https://access.redhat.com/errata/RHSA-2013:0685
https://access.redhat.com/security/cve/cve-2012-6329
https://access.redhat.com/security/cve/cve-2013-1667
Severity: High
ID: 65698
File Name: redhat-RHSA-2013-0685.nasl
Version: 1.34
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 3/27/2013
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:redhat:enterprise_linux:perl-compress-raw-bzip2, p-cpe:/a:redhat:enterprise_linux:perl-compress-raw-zlib, p-cpe:/a:redhat:enterprise_linux:perl-devel, p-cpe:/a:redhat:enterprise_linux:perl-log-message-simple, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:perl-locale-maketext-simple, p-cpe:/a:redhat:enterprise_linux:perl-term-ui, p-cpe:/a:redhat:enterprise_linux:perl-archive-tar, p-cpe:/a:redhat:enterprise_linux:perl-package-constants, p-cpe:/a:redhat:enterprise_linux:perl-core, p-cpe:/a:redhat:enterprise_linux:perl-module-corelist, p-cpe:/a:redhat:enterprise_linux:perl, p-cpe:/a:redhat:enterprise_linux:perl-module-build, p-cpe:/a:redhat:enterprise_linux:perl-log-message, p-cpe:/a:redhat:enterprise_linux:perl-digest-sha, p-cpe:/a:redhat:enterprise_linux:perl-module-load-conditional, p-cpe:/a:redhat:enterprise_linux:perl-object-accessor, p-cpe:/a:redhat:enterprise_linux:perl-module-pluggable, p-cpe:/a:redhat:enterprise_linux:perl-ipc-cmd, p-cpe:/a:redhat:enterprise_linux:perl-params-check, p-cpe:/a:redhat:enterprise_linux:perl-extutils-makemaker, p-cpe:/a:redhat:enterprise_linux:perl-extutils-cbuilder, p-cpe:/a:redhat:enterprise_linux:perl-extutils-embed, p-cpe:/a:redhat:enterprise_linux:perl-test-harness, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:perl-io-compress-zlib, p-cpe:/a:redhat:enterprise_linux:perl-cpan, p-cpe:/a:redhat:enterprise_linux:perl-suidperl, p-cpe:/a:redhat:enterprise_linux:perl-pod-escapes, p-cpe:/a:redhat:enterprise_linux:perl-extutils-parsexs, p-cpe:/a:redhat:enterprise_linux:perl-time-piece, p-cpe:/a:redhat:enterprise_linux:perl-file-fetch, p-cpe:/a:redhat:enterprise_linux:perl-parse-cpan-meta, p-cpe:/a:redhat:enterprise_linux:perl-archive-extract, p-cpe:/a:redhat:enterprise_linux:perl-io-compress-base, p-cpe:/a:redhat:enterprise_linux:perl-module-loaded, p-cpe:/a:redhat:enterprise_linux:perl-module-load, p-cpe:/a:redhat:enterprise_linux:perl-io-compress-bzip2, p-cpe:/a:redhat:enterprise_linux:perl-cpanplus, p-cpe:/a:redhat:enterprise_linux:perl-debuginfo, p-cpe:/a:redhat:enterprise_linux:perl-parent, p-cpe:/a:redhat:enterprise_linux:perl-io-zlib, p-cpe:/a:redhat:enterprise_linux:perl-time-hires, p-cpe:/a:redhat:enterprise_linux:perl-version, p-cpe:/a:redhat:enterprise_linux:perl-pod-simple, cpe:/o:redhat:enterprise_linux:5.9, p-cpe:/a:redhat:enterprise_linux:perl-libs, p-cpe:/a:redhat:enterprise_linux:perl-cgi, cpe:/o:redhat:enterprise_linux:6.4, p-cpe:/a:redhat:enterprise_linux:perl-compress-zlib, p-cpe:/a:redhat:enterprise_linux:perl-test-simple
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/26/2013
Vulnerability Publication Date: 11/21/2012
Metasploit (TWiki MAKETEXT Remote Command Execution)
Elliot (Foswiki 1.1.5 RCE)
CVE: CVE-2012-5195, CVE-2012-5526, CVE-2012-6329, CVE-2013-1667
BID: 56287, 56562, 56950, 58311
RHSA: 2013:0685