Language:
Severity: High
ID: 71336
File Name: redhat-RHSA-2013-1813.nasl
Version: 1.14
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/11/2013
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.2
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:redhat:enterprise_linux:php-pspell, p-cpe:/a:redhat:enterprise_linux:php53-ldap, p-cpe:/a:redhat:enterprise_linux:php-zts, p-cpe:/a:redhat:enterprise_linux:php53-pspell, p-cpe:/a:redhat:enterprise_linux:php53-cli, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:php-embedded, p-cpe:/a:redhat:enterprise_linux:php-fpm, p-cpe:/a:redhat:enterprise_linux:php-mysql, p-cpe:/a:redhat:enterprise_linux:php53-soap, p-cpe:/a:redhat:enterprise_linux:php53-common, p-cpe:/a:redhat:enterprise_linux:php53-mbstring, p-cpe:/a:redhat:enterprise_linux:php-xml, p-cpe:/a:redhat:enterprise_linux:php-bcmath, p-cpe:/a:redhat:enterprise_linux:php-cli, p-cpe:/a:redhat:enterprise_linux:php-devel, p-cpe:/a:redhat:enterprise_linux:php53-odbc, p-cpe:/a:redhat:enterprise_linux:php-enchant, p-cpe:/a:redhat:enterprise_linux:php53-pgsql, p-cpe:/a:redhat:enterprise_linux:php53-devel, p-cpe:/a:redhat:enterprise_linux:php, p-cpe:/a:redhat:enterprise_linux:php53-bcmath, p-cpe:/a:redhat:enterprise_linux:php-tidy, p-cpe:/a:redhat:enterprise_linux:php-recode, p-cpe:/a:redhat:enterprise_linux:php53-debuginfo, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:php-gd, p-cpe:/a:redhat:enterprise_linux:php-snmp, p-cpe:/a:redhat:enterprise_linux:php-debuginfo, p-cpe:/a:redhat:enterprise_linux:php-ldap, p-cpe:/a:redhat:enterprise_linux:php53-snmp, p-cpe:/a:redhat:enterprise_linux:php53-mysql, p-cpe:/a:redhat:enterprise_linux:php53-xml, p-cpe:/a:redhat:enterprise_linux:php-imap, p-cpe:/a:redhat:enterprise_linux:php-odbc, p-cpe:/a:redhat:enterprise_linux:php-xmlrpc, p-cpe:/a:redhat:enterprise_linux:php53-intl, p-cpe:/a:redhat:enterprise_linux:php53-pdo, cpe:/o:redhat:enterprise_linux:6.5, p-cpe:/a:redhat:enterprise_linux:php-mbstring, p-cpe:/a:redhat:enterprise_linux:php53-dba, p-cpe:/a:redhat:enterprise_linux:php53-imap, p-cpe:/a:redhat:enterprise_linux:php-common, p-cpe:/a:redhat:enterprise_linux:php-intl, p-cpe:/a:redhat:enterprise_linux:php-soap, p-cpe:/a:redhat:enterprise_linux:php53-gd, p-cpe:/a:redhat:enterprise_linux:php53-xmlrpc, p-cpe:/a:redhat:enterprise_linux:php53-process, p-cpe:/a:redhat:enterprise_linux:php-pdo, p-cpe:/a:redhat:enterprise_linux:php-dba, p-cpe:/a:redhat:enterprise_linux:php53, p-cpe:/a:redhat:enterprise_linux:php-pgsql, p-cpe:/a:redhat:enterprise_linux:php-process
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/11/2013
Vulnerability Publication Date: 12/16/2013
CVE: CVE-2013-6420
BID: 64225
RHSA: 2013:1813