Language:
http://www.nessus.org/u?63b2259d
https://access.redhat.com/errata/RHSA-2015:2622
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1180637
https://bugzilla.redhat.com/show_bug.cgi?id=1209139
https://bugzilla.redhat.com/show_bug.cgi?id=1209929
https://bugzilla.redhat.com/show_bug.cgi?id=1230915
https://bugzilla.redhat.com/show_bug.cgi?id=1246054
https://bugzilla.redhat.com/show_bug.cgi?id=1254909
https://bugzilla.redhat.com/show_bug.cgi?id=1255021
https://bugzilla.redhat.com/show_bug.cgi?id=1258061
https://bugzilla.redhat.com/show_bug.cgi?id=1258521
https://bugzilla.redhat.com/show_bug.cgi?id=1258578
https://bugzilla.redhat.com/show_bug.cgi?id=1262443
https://bugzilla.redhat.com/show_bug.cgi?id=1263741
https://bugzilla.redhat.com/show_bug.cgi?id=1269509
https://bugzilla.redhat.com/show_bug.cgi?id=1276443
https://bugzilla.redhat.com/show_bug.cgi?id=1276676
Severity: Medium
ID: 87452
File Name: redhat-RHSA-2015-2622.nasl
Version: 2.13
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/17/2015
Updated: 6/3/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 2.5
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 6
Temporal Score: 4.4
Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS Score Source: CVE-2015-5233
Risk Factor: Medium
Base Score: 4.2
Temporal Score: 3.7
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:foreman-vmware, p-cpe:/a:redhat:enterprise_linux:foreman, p-cpe:/a:redhat:enterprise_linux:foreman-compute, p-cpe:/a:redhat:enterprise_linux:gofer, p-cpe:/a:redhat:enterprise_linux:rubygem-newt, p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery_image, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-foreman_discovery, p-cpe:/a:redhat:enterprise_linux:python-gofer, p-cpe:/a:redhat:enterprise_linux:foreman-postgresql, p-cpe:/a:redhat:enterprise_linux:libqpid-dispatch, p-cpe:/a:redhat:enterprise_linux:qpid-dispatch, p-cpe:/a:redhat:enterprise_linux:foreman-proxy, p-cpe:/a:redhat:enterprise_linux:katello-installer-base, p-cpe:/a:redhat:enterprise_linux:python-gofer-proton, p-cpe:/a:redhat:enterprise_linux:python-gofer-qpid, p-cpe:/a:redhat:enterprise_linux:qpid-proton-c, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-foreman-redhat_access, p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery, p-cpe:/a:redhat:enterprise_linux:capsule-installer, p-cpe:/a:redhat:enterprise_linux:foreman-discovery-image, p-cpe:/a:redhat:enterprise_linux:python-qpid-proton, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-redhat_access_lib, p-cpe:/a:redhat:enterprise_linux:rubygem-hammer_cli_foreman_docker-doc, p-cpe:/a:redhat:enterprise_linux:katello-installer, p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-tools, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-foreman_bootdisk, p-cpe:/a:redhat:enterprise_linux:foreman-ovirt, p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-router, p-cpe:/a:redhat:enterprise_linux:qpid-proton, p-cpe:/a:redhat:enterprise_linux:foreman-gce, p-cpe:/a:redhat:enterprise_linux:python-nectar, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:python-qpid, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-katello, p-cpe:/a:redhat:enterprise_linux:foreman-libvirt, p-cpe:/a:redhat:enterprise_linux:katello-agent, p-cpe:/a:redhat:enterprise_linux:foreman-debug, p-cpe:/a:redhat:enterprise_linux:rubygem-hammer_cli_foreman_docker
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 12/15/2015
Vulnerability Publication Date: 4/11/2016
CVE: CVE-2015-5233