Language:
http://www.nessus.org/u?43d40ccb
http://www.nessus.org/u?4d574e12
https://access.redhat.com/errata/RHSA-2012:0100
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=613931
https://bugzilla.redhat.com/show_bug.cgi?id=748735
https://bugzilla.redhat.com/show_bug.cgi?id=750063
https://bugzilla.redhat.com/show_bug.cgi?id=751072
https://bugzilla.redhat.com/show_bug.cgi?id=751779
https://bugzilla.redhat.com/show_bug.cgi?id=751834
https://bugzilla.redhat.com/show_bug.cgi?id=752322
https://bugzilla.redhat.com/show_bug.cgi?id=753829
https://bugzilla.redhat.com/show_bug.cgi?id=754202
https://bugzilla.redhat.com/show_bug.cgi?id=756401
https://bugzilla.redhat.com/show_bug.cgi?id=756402
https://bugzilla.redhat.com/show_bug.cgi?id=759154
https://bugzilla.redhat.com/show_bug.cgi?id=759200
https://bugzilla.redhat.com/show_bug.cgi?id=759433
https://bugzilla.redhat.com/show_bug.cgi?id=759548
https://bugzilla.redhat.com/show_bug.cgi?id=761165
https://bugzilla.redhat.com/show_bug.cgi?id=761588
https://bugzilla.redhat.com/show_bug.cgi?id=765713
https://bugzilla.redhat.com/show_bug.cgi?id=765846
https://bugzilla.redhat.com/show_bug.cgi?id=771642
https://bugzilla.redhat.com/show_bug.cgi?id=773680
Severity: High
ID: 76638
File Name: redhat-RHSA-2012-0100.nasl
Version: 1.14
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/22/2014
Updated: 4/27/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 4.4
Temporal Score: 3.3
Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2011-4930
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:condor, p-cpe:/a:redhat:enterprise_linux:condor-aviary, p-cpe:/a:redhat:enterprise_linux:condor-classads, p-cpe:/a:redhat:enterprise_linux:condor-ec2-enhanced, p-cpe:/a:redhat:enterprise_linux:condor-ec2-enhanced-hooks, p-cpe:/a:redhat:enterprise_linux:condor-kbdd, p-cpe:/a:redhat:enterprise_linux:condor-qmf, p-cpe:/a:redhat:enterprise_linux:condor-vm-gahp, p-cpe:/a:redhat:enterprise_linux:condor-wallaby-base-db, p-cpe:/a:redhat:enterprise_linux:cumin, p-cpe:/a:redhat:enterprise_linux:python-condorec2e, p-cpe:/a:redhat:enterprise_linux:python-psycopg2, p-cpe:/a:redhat:enterprise_linux:python-wallaby, p-cpe:/a:redhat:enterprise_linux:ruby-spqr, p-cpe:/a:redhat:enterprise_linux:ruby-wallaby, p-cpe:/a:redhat:enterprise_linux:spqr-gen, p-cpe:/a:redhat:enterprise_linux:wallaby, p-cpe:/a:redhat:enterprise_linux:wallaby-utils, cpe:/o:redhat:enterprise_linux:5
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Patch Publication Date: 2/6/2012
Vulnerability Publication Date: 2/10/2014
CVE: CVE-2011-4930
RHSA: 2012:0100