Language:
https://oss.oracle.com/pipermail/el-errata/2012-February/002590.html
https://oss.oracle.com/pipermail/el-errata/2012-February/002593.html
https://oss.oracle.com/pipermail/el-errata/2012-February/002595.html
Severity: High
ID: 68449
File Name: oraclelinux_ELSA-2012-0093.nasl
Version: 1.9
Type: local
Agent: unix
Published: 7/12/2013
Updated: 1/14/2021
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:oracle:linux:php, p-cpe:/a:oracle:linux:php-bcmath, p-cpe:/a:oracle:linux:php-cli, p-cpe:/a:oracle:linux:php-common, p-cpe:/a:oracle:linux:php-dba, p-cpe:/a:oracle:linux:php-devel, p-cpe:/a:oracle:linux:php-domxml, p-cpe:/a:oracle:linux:php-embedded, p-cpe:/a:oracle:linux:php-enchant, p-cpe:/a:oracle:linux:php-gd, p-cpe:/a:oracle:linux:php-imap, p-cpe:/a:oracle:linux:php-intl, p-cpe:/a:oracle:linux:php-ldap, p-cpe:/a:oracle:linux:php-mbstring, p-cpe:/a:oracle:linux:php-mysql, p-cpe:/a:oracle:linux:php-ncurses, p-cpe:/a:oracle:linux:php-odbc, p-cpe:/a:oracle:linux:php-pdo, p-cpe:/a:oracle:linux:php-pear, p-cpe:/a:oracle:linux:php-pgsql, p-cpe:/a:oracle:linux:php-process, p-cpe:/a:oracle:linux:php-pspell, p-cpe:/a:oracle:linux:php-recode, p-cpe:/a:oracle:linux:php-snmp, p-cpe:/a:oracle:linux:php-soap, p-cpe:/a:oracle:linux:php-tidy, p-cpe:/a:oracle:linux:php-xml, p-cpe:/a:oracle:linux:php-xmlrpc, p-cpe:/a:oracle:linux:php-zts, cpe:/o:oracle:linux:4, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6
Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/3/2012
Vulnerability Publication Date: 2/6/2012
CVE: CVE-2012-0830
BID: 51830
RHSA: 2012:0093