语言:
https://access.redhat.com/security/updates/classification/#important
http://www.nessus.org/u?a1c38e52
http://www.nessus.org/u?54d9438d
http://www.nessus.org/u?8eddaf5d
http://www.nessus.org/u?50229a1a
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-37.html
https://bugzilla.redhat.com/show_bug.cgi?id=1414133
https://bugzilla.redhat.com/show_bug.cgi?id=1414337
https://bugzilla.redhat.com/show_bug.cgi?id=1414338
https://bugzilla.redhat.com/show_bug.cgi?id=1414342
https://bugzilla.redhat.com/show_bug.cgi?id=1414350
https://bugzilla.redhat.com/show_bug.cgi?id=1414351
https://bugzilla.redhat.com/show_bug.cgi?id=1414352
https://bugzilla.redhat.com/show_bug.cgi?id=1414353
https://bugzilla.redhat.com/show_bug.cgi?id=1414355
https://bugzilla.redhat.com/show_bug.cgi?id=1414357
https://bugzilla.redhat.com/show_bug.cgi?id=1414423
https://bugzilla.redhat.com/show_bug.cgi?id=1414429
https://bugzilla.redhat.com/show_bug.cgi?id=1422119
https://bugzilla.redhat.com/show_bug.cgi?id=1431690
https://bugzilla.redhat.com/show_bug.cgi?id=1433010
https://bugzilla.redhat.com/show_bug.cgi?id=1443358
https://bugzilla.redhat.com/show_bug.cgi?id=1443359
https://bugzilla.redhat.com/show_bug.cgi?id=1443363
https://bugzilla.redhat.com/show_bug.cgi?id=1443364
https://bugzilla.redhat.com/show_bug.cgi?id=1443365
https://bugzilla.redhat.com/show_bug.cgi?id=1443369
https://bugzilla.redhat.com/show_bug.cgi?id=1443376
https://bugzilla.redhat.com/show_bug.cgi?id=1443377
https://bugzilla.redhat.com/show_bug.cgi?id=1443378
https://bugzilla.redhat.com/show_bug.cgi?id=1443379
https://bugzilla.redhat.com/show_bug.cgi?id=1443386
https://bugzilla.redhat.com/show_bug.cgi?id=1472683
https://bugzilla.redhat.com/show_bug.cgi?id=1472684
https://bugzilla.redhat.com/show_bug.cgi?id=1472686
https://bugzilla.redhat.com/show_bug.cgi?id=1472693
https://bugzilla.redhat.com/show_bug.cgi?id=1472703
https://bugzilla.redhat.com/show_bug.cgi?id=1472704
https://bugzilla.redhat.com/show_bug.cgi?id=1472705
https://bugzilla.redhat.com/show_bug.cgi?id=1472708
https://bugzilla.redhat.com/show_bug.cgi?id=1472710
https://bugzilla.redhat.com/show_bug.cgi?id=1472711
https://bugzilla.redhat.com/show_bug.cgi?id=1477575
严重性: Medium
ID: 210269
文件名: redhat-RHSA-2017-2787.nasl
版本: 1.2
类型: local
代理: unix
发布时间: 2024/11/5
最近更新时间: 2025/3/24
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Medium
分数: 6.7
Vendor Severity: Important
风险因素: Medium
基本分数: 6.3
时间分数: 4.9
矢量: CVSS2#AV:N/AC:M/Au:S/C:C/I:N/A:N
CVSS 分数来源: CVE-2017-3305
风险因素: Medium
基本分数: 6.7
时间分数: 6
矢量: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CVSS 分数来源: CVE-2017-3312
CPE: p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-errmsg, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-test, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-bench, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-config, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-common, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-devel, p-cpe:/a:redhat:enterprise_linux:rh-mysql56-mysql-server
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2017/9/21
漏洞发布日期: 2017/1/17
CVE: CVE-2016-5483, CVE-2016-8327, CVE-2017-3238, CVE-2017-3244, CVE-2017-3257, CVE-2017-3258, CVE-2017-3265, CVE-2017-3273, CVE-2017-3291, CVE-2017-3302, CVE-2017-3305, CVE-2017-3308, CVE-2017-3309, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3450, CVE-2017-3452, CVE-2017-3453, CVE-2017-3456, CVE-2017-3461, CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3599, CVE-2017-3600, CVE-2017-3633, CVE-2017-3634, CVE-2017-3636, CVE-2017-3641, CVE-2017-3647, CVE-2017-3648, CVE-2017-3649, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653