語系:
https://access.redhat.com/security/cve/CVE-2018-19869
https://access.redhat.com/security/cve/CVE-2018-19871
https://access.redhat.com/security/cve/CVE-2018-19872
https://access.redhat.com/security/cve/CVE-2019-18281
https://access.redhat.com/errata/RHSA-2020:1665
https://bugzilla.redhat.com/1661460
https://bugzilla.redhat.com/1661465
嚴重性: Medium
ID: 136117
檔案名稱: redhat-RHSA-2020-1665.nasl
版本: 1.10
類型: local
代理程式: unix
已發布: 2020/4/29
已更新: 2024/3/14
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
風險因素: Medium
分數: 4.4
風險因素: Medium
基本分數: 4.3
時間分數: 3.4
媒介: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS 評分資料來源: CVE-2018-19872
風險因素: Medium
基本分數: 6.5
時間分數: 5.9
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2018-19871
CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.2, cpe:/o:redhat:rhel_aus:8.4, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.2, cpe:/o:redhat:rhel_e4s:8.4, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.2, cpe:/o:redhat:rhel_eus:8.4, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.2, cpe:/o:redhat:rhel_tus:8.4, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:python-qt5-rpm-macros, p-cpe:/a:redhat:enterprise_linux:python3-pyqt5-sip, p-cpe:/a:redhat:enterprise_linux:python3-qt5, p-cpe:/a:redhat:enterprise_linux:python3-qt5-base, p-cpe:/a:redhat:enterprise_linux:python3-qt5-devel, p-cpe:/a:redhat:enterprise_linux:python3-sip-devel, p-cpe:/a:redhat:enterprise_linux:qgnomeplatform, p-cpe:/a:redhat:enterprise_linux:qt5-assistant, p-cpe:/a:redhat:enterprise_linux:qt5-designer, p-cpe:/a:redhat:enterprise_linux:qt5-devel, p-cpe:/a:redhat:enterprise_linux:qt5-doctools, p-cpe:/a:redhat:enterprise_linux:qt5-linguist, p-cpe:/a:redhat:enterprise_linux:qt5-qdbusviewer, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-common, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-gui, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-mysql, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-odbc, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-postgresql, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-private-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-static, p-cpe:/a:redhat:enterprise_linux:qt5-qtcanvas3d, p-cpe:/a:redhat:enterprise_linux:qt5-qtcanvas3d-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-static, p-cpe:/a:redhat:enterprise_linux:qt5-qtdoc, p-cpe:/a:redhat:enterprise_linux:qt5-qtgraphicaleffects, p-cpe:/a:redhat:enterprise_linux:qt5-qtimageformats, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialbus, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialbus-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qttools, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-common, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-designer, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-designercomponents, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-help, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-static, p-cpe:/a:redhat:enterprise_linux:qt5-qttranslations, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtx11extras, p-cpe:/a:redhat:enterprise_linux:qt5-qtx11extras-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns-examples, p-cpe:/a:redhat:enterprise_linux:qt5-rpm-macros, p-cpe:/a:redhat:enterprise_linux:qt5-srpm-macros, p-cpe:/a:redhat:enterprise_linux:sip
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2020/4/29
弱點發布日期: 2018/12/4
CVE: CVE-2018-19869, CVE-2018-19871, CVE-2018-19872
BID: 106338