语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-037.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49513.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49743.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49748.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49752.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49753.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0386.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1073.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1652.html
https://alas.aws.amazon.com/cve/html/CVE-2023-26605.html
https://alas.aws.amazon.com/cve/html/CVE-2023-3161.html
https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52928.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52930.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52932.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52933.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52936.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52973.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52976.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52977.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52979.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52983.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52986.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52991.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52992.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52993.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52996.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52997.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52999.html
https://alas.aws.amazon.com/cve/html/CVE-2023-53000.html
https://alas.aws.amazon.com/cve/html/CVE-2023-53006.html
https://alas.aws.amazon.com/cve/html/CVE-2023-53007.html
https://alas.aws.amazon.com/cve/html/CVE-2023-53019.html
https://alas.aws.amazon.com/cve/html/CVE-2023-53021.html
严重性: High
ID: 190056
文件名: al2_ALASKERNEL-5_15-2024-037.nasl
版本: 1.18
类型: local
代理: unix
发布时间: 2024/2/6
最近更新时间: 2025/9/25
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Critical
分数: 9.2
风险因素: Medium
基本分数: 6.8
时间分数: 5.9
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2023-52930
风险因素: High
基本分数: 7.8
时间分数: 7.5
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.93-55.139, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:bpftool
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/2/1
漏洞发布日期: 2023/2/17
CISA 已知可遭利用的漏洞到期日期: 2025/7/8
Core Impact
Metasploit (Local Privilege Escalation via CVE-2023-0386)
CVE: CVE-2022-4129, CVE-2022-49513, CVE-2022-49743, CVE-2022-49748, CVE-2022-49752, CVE-2022-49753, CVE-2023-0386, CVE-2023-1073, CVE-2023-1652, CVE-2023-26605, CVE-2023-3161, CVE-2023-3567, CVE-2023-52928, CVE-2023-52930, CVE-2023-52932, CVE-2023-52933, CVE-2023-52936, CVE-2023-52973, CVE-2023-52976, CVE-2023-52977, CVE-2023-52979, CVE-2023-52983, CVE-2023-52986, CVE-2023-52991, CVE-2023-52992, CVE-2023-52993, CVE-2023-52996, CVE-2023-52997, CVE-2023-52999, CVE-2023-53000, CVE-2023-53006, CVE-2023-53007, CVE-2023-53019, CVE-2023-53021, CVE-2023-53024, CVE-2023-53026
IAVA: 2025-A-0456