Language:
http://www.nessus.org/u?116cf5c7
http://www.nessus.org/u?82c362fb
https://access.redhat.com/errata/RHSA-2013:1307
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=662707
https://bugzilla.redhat.com/show_bug.cgi?id=789468
https://bugzilla.redhat.com/show_bug.cgi?id=828051
https://bugzilla.redhat.com/show_bug.cgi?id=837044
https://bugzilla.redhat.com/show_bug.cgi?id=853329
https://bugzilla.redhat.com/show_bug.cgi?id=869691
https://bugzilla.redhat.com/show_bug.cgi?id=869693
https://bugzilla.redhat.com/show_bug.cgi?id=869697
https://bugzilla.redhat.com/show_bug.cgi?id=892695
https://bugzilla.redhat.com/show_bug.cgi?id=918187
https://bugzilla.redhat.com/show_bug.cgi?id=951075
Severity: Critical
ID: 70244
File Name: redhat-RHSA-2013-1307.nasl
Version: 1.19
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/1/2013
Updated: 4/24/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Moderate
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2012-2688
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2006-7243
CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:php53, p-cpe:/a:redhat:enterprise_linux:php53-bcmath, p-cpe:/a:redhat:enterprise_linux:php53-cli, p-cpe:/a:redhat:enterprise_linux:php53-common, p-cpe:/a:redhat:enterprise_linux:php53-dba, p-cpe:/a:redhat:enterprise_linux:php53-devel, p-cpe:/a:redhat:enterprise_linux:php53-gd, p-cpe:/a:redhat:enterprise_linux:php53-imap, p-cpe:/a:redhat:enterprise_linux:php53-intl, p-cpe:/a:redhat:enterprise_linux:php53-ldap, p-cpe:/a:redhat:enterprise_linux:php53-mbstring, p-cpe:/a:redhat:enterprise_linux:php53-mysql, p-cpe:/a:redhat:enterprise_linux:php53-odbc, p-cpe:/a:redhat:enterprise_linux:php53-pdo, p-cpe:/a:redhat:enterprise_linux:php53-pgsql, p-cpe:/a:redhat:enterprise_linux:php53-process, p-cpe:/a:redhat:enterprise_linux:php53-pspell, p-cpe:/a:redhat:enterprise_linux:php53-snmp, p-cpe:/a:redhat:enterprise_linux:php53-soap, p-cpe:/a:redhat:enterprise_linux:php53-xml, p-cpe:/a:redhat:enterprise_linux:php53-xmlrpc
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/30/2013
CVE: CVE-2006-7243, CVE-2011-1398, CVE-2012-0831, CVE-2012-2688, CVE-2013-1643, CVE-2013-4248