语言:
http://www.nessus.org/u?62cd07f5
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2273404
https://bugzilla.redhat.com/show_bug.cgi?id=2277202
https://bugzilla.redhat.com/show_bug.cgi?id=2277204
https://bugzilla.redhat.com/show_bug.cgi?id=2277205
严重性: High
ID: 200095
文件名: redhat-RHSA-2024-3588.nasl
版本: 1.7
类型: local
代理: unix
发布时间: 2024/6/4
最近更新时间: 2025/3/27
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 7.2
Vendor Severity: Important
风险因素: High
基本分数: 9
时间分数: 7.4
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:P
CVSS 分数来源: CVE-2024-2961
风险因素: High
基本分数: 8.1
时间分数: 7.5
矢量: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CVSS 分数来源: CVE-2024-33599
CPE: p-cpe:/a:redhat:enterprise_linux:glibc-devel, p-cpe:/a:redhat:enterprise_linux:nscd, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:glibc-utils, p-cpe:/a:redhat:enterprise_linux:glibc, p-cpe:/a:redhat:enterprise_linux:glibc-headers, p-cpe:/a:redhat:enterprise_linux:glibc-common, p-cpe:/a:redhat:enterprise_linux:glibc-static
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/6/4
漏洞发布日期: 2024/4/5
Metasploit (CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961))
CVE: CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602