語系:
https://access.redhat.com/security/cve/CVE-2020-6559
https://access.redhat.com/security/cve/CVE-2020-6560
https://access.redhat.com/security/cve/CVE-2020-6561
https://access.redhat.com/security/cve/CVE-2020-6562
https://access.redhat.com/security/cve/CVE-2020-6563
https://access.redhat.com/security/cve/CVE-2020-6564
https://access.redhat.com/security/cve/CVE-2020-6565
https://access.redhat.com/security/cve/CVE-2020-6566
https://access.redhat.com/security/cve/CVE-2020-6567
https://access.redhat.com/security/cve/CVE-2020-6568
https://access.redhat.com/security/cve/CVE-2020-6569
https://access.redhat.com/security/cve/CVE-2020-6570
https://access.redhat.com/security/cve/CVE-2020-6571
https://access.redhat.com/errata/RHSA-2020:3723
https://bugzilla.redhat.com/1872945
https://bugzilla.redhat.com/1872946
https://bugzilla.redhat.com/1872947
https://bugzilla.redhat.com/1872948
https://bugzilla.redhat.com/1872949
https://bugzilla.redhat.com/1872950
https://bugzilla.redhat.com/1872951
https://bugzilla.redhat.com/1872952
https://bugzilla.redhat.com/1872953
https://bugzilla.redhat.com/1872955
https://bugzilla.redhat.com/1872956
嚴重性: High
ID: 140494
檔案名稱: redhat-RHSA-2020-3723.nasl
版本: 1.8
類型: local
代理程式: unix
已發布: 2020/9/10
已更新: 2024/2/20
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Medium
分數: 5.9
風險因素: High
基本分數: 9.3
時間分數: 7.3
媒介: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2020-6559
風險因素: High
基本分數: 8.8
時間分數: 7.9
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:rhel_els:6, cpe:/o:redhat:rhel_eus:6.0, p-cpe:/a:redhat:enterprise_linux:chromium-browser
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2020/9/10
弱點發布日期: 2020/8/25
CVE: CVE-2020-6559, CVE-2020-6560, CVE-2020-6561, CVE-2020-6562, CVE-2020-6563, CVE-2020-6564, CVE-2020-6565, CVE-2020-6566, CVE-2020-6567, CVE-2020-6568, CVE-2020-6569, CVE-2020-6570, CVE-2020-6571