语言:
https://access.redhat.com/security/updates/classification/#important
http://www.nessus.org/u?93a2c1f1
https://jenkins.io/changelog-stable/#v1.642.2
https://bugzilla.redhat.com/show_bug.cgi?id=1311946
https://bugzilla.redhat.com/show_bug.cgi?id=1311947
https://bugzilla.redhat.com/show_bug.cgi?id=1311948
https://bugzilla.redhat.com/show_bug.cgi?id=1311949
https://bugzilla.redhat.com/show_bug.cgi?id=1311950
https://bugzilla.redhat.com/show_bug.cgi?id=1324664
严重性: Critical
ID: 311997
文件名: rhcos-RHSA-2016-0711.nasl
版本: 1.2
类型: Local
代理: unix
发布时间: 2026/5/4
最近更新时间: 2026/5/5
支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: Critical
分数: 9.2
Vendor Severity: Important
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2016-0788
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2016-0791
CPE: p-cpe:/a:redhat:enterprise_linux:jenkins-plugin-openshift-pipeline, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:jenkins-plugin-credentials, cpe:/o:redhat:enterprise_linux:7:coreos, p-cpe:/a:redhat:enterprise_linux:jenkins-plugin-durable-task, p-cpe:/a:redhat:enterprise_linux:jenkins-plugin-kubernetes
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2016/5/3
漏洞发布日期: 2016/2/24
CANVAS (CANVAS)
Core Impact
Metasploit (Jenkins XStream Groovy classpath Deserialization Vulnerability)
CVE: CVE-2016-0788, CVE-2016-0789, CVE-2016-0790, CVE-2016-0791, CVE-2016-0792
RHSA: 2016:0711