Language:
http://www.nessus.org/u?46570f69
http://www.nessus.org/u?96c80b5c
https://access.redhat.com/errata/RHSA-2013:0562
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=851355
Severity: Medium
ID: 76655
File Name: redhat-RHSA-2013-0562.nasl
Version: 1.15
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/22/2014
Updated: 11/4/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.8
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2012-4446
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:saslwrapper, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-store, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-ssl, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-rdma, p-cpe:/a:redhat:enterprise_linux:xqilla, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-xml, p-cpe:/a:redhat:enterprise_linux:qpid-java-common, p-cpe:/a:redhat:enterprise_linux:qpid-tests, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-rdma, p-cpe:/a:redhat:enterprise_linux:qpid-jca, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-devel-docs, p-cpe:/a:redhat:enterprise_linux:saslwrapper-devel, p-cpe:/a:redhat:enterprise_linux:rhm-docs, p-cpe:/a:redhat:enterprise_linux:xqilla-doc, p-cpe:/a:redhat:enterprise_linux:cumin-messaging, p-cpe:/a:redhat:enterprise_linux:python-qpid-qmf, p-cpe:/a:redhat:enterprise_linux:ruby-saslwrapper, p-cpe:/a:redhat:enterprise_linux:qpid-java, p-cpe:/a:redhat:enterprise_linux:qpid-jca-xarecovery, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-devel, p-cpe:/a:redhat:enterprise_linux:qpid-tools, p-cpe:/a:redhat:enterprise_linux:ruby-qpid-qmf, p-cpe:/a:redhat:enterprise_linux:xerces-c-doc, p-cpe:/a:redhat:enterprise_linux:rubygems, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client, p-cpe:/a:redhat:enterprise_linux:python-saslwrapper, p-cpe:/a:redhat:enterprise_linux:qpid-cpp, p-cpe:/a:redhat:enterprise_linux:xerces-c, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-cluster, p-cpe:/a:redhat:enterprise_linux:qpid-java-client, p-cpe:/a:redhat:enterprise_linux:rubygem-rake, p-cpe:/a:redhat:enterprise_linux:xerces-c-devel, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-devel, p-cpe:/a:redhat:enterprise_linux:qpid-java-example, p-cpe:/a:redhat:enterprise_linux:python-qpid, p-cpe:/a:redhat:enterprise_linux:mrg-release, p-cpe:/a:redhat:enterprise_linux:xqilla-devel, p-cpe:/a:redhat:enterprise_linux:qpid-qmf-devel, p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-ssl, p-cpe:/a:redhat:enterprise_linux:qpid-qmf
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Patch Publication Date: 3/6/2013
Vulnerability Publication Date: 3/13/2013
CVE: CVE-2012-4446, CVE-2012-4458, CVE-2012-4459
RHSA: 2013:0562