語系:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004963
https://security-tracker.debian.org/tracker/source-package/libde265
https://www.debian.org/security/2023/dsa-5346
https://security-tracker.debian.org/tracker/CVE-2020-21594
https://security-tracker.debian.org/tracker/CVE-2020-21595
https://security-tracker.debian.org/tracker/CVE-2020-21596
https://security-tracker.debian.org/tracker/CVE-2020-21597
https://security-tracker.debian.org/tracker/CVE-2020-21598
https://security-tracker.debian.org/tracker/CVE-2020-21599
https://security-tracker.debian.org/tracker/CVE-2020-21600
https://security-tracker.debian.org/tracker/CVE-2020-21601
https://security-tracker.debian.org/tracker/CVE-2020-21602
https://security-tracker.debian.org/tracker/CVE-2020-21603
https://security-tracker.debian.org/tracker/CVE-2020-21604
https://security-tracker.debian.org/tracker/CVE-2020-21605
https://security-tracker.debian.org/tracker/CVE-2020-21606
https://security-tracker.debian.org/tracker/CVE-2021-35452
https://security-tracker.debian.org/tracker/CVE-2021-36408
https://security-tracker.debian.org/tracker/CVE-2021-36409
https://security-tracker.debian.org/tracker/CVE-2021-36410
https://security-tracker.debian.org/tracker/CVE-2021-36411
https://security-tracker.debian.org/tracker/CVE-2022-1253
https://security-tracker.debian.org/tracker/CVE-2022-43235
https://security-tracker.debian.org/tracker/CVE-2022-43236
https://security-tracker.debian.org/tracker/CVE-2022-43237
https://security-tracker.debian.org/tracker/CVE-2022-43238
https://security-tracker.debian.org/tracker/CVE-2022-43239
https://security-tracker.debian.org/tracker/CVE-2022-43240
https://security-tracker.debian.org/tracker/CVE-2022-43241
https://security-tracker.debian.org/tracker/CVE-2022-43242
https://security-tracker.debian.org/tracker/CVE-2022-43243
https://security-tracker.debian.org/tracker/CVE-2022-43244
https://security-tracker.debian.org/tracker/CVE-2022-43245
https://security-tracker.debian.org/tracker/CVE-2022-43248
https://security-tracker.debian.org/tracker/CVE-2022-43249
https://security-tracker.debian.org/tracker/CVE-2022-43250
https://security-tracker.debian.org/tracker/CVE-2022-43252
https://security-tracker.debian.org/tracker/CVE-2022-43253
嚴重性: Critical
ID: 171376
檔案名稱: debian_DSA-5346.nasl
版本: 1.1
類型: local
代理程式: unix
已發布: 2023/2/11
已更新: 2023/9/4
支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Medium
分數: 6.7
風險因素: High
基本分數: 7.5
時間分數: 5.9
媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 評分資料來源: CVE-2022-1253
風險因素: Critical
基本分數: 9.8
時間分數: 8.8
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libde265-0, p-cpe:/a:debian:debian_linux:libde265-dev, p-cpe:/a:debian:debian_linux:libde265-examples, cpe:/o:debian:debian_linux:11.0
必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2023/2/10
弱點發布日期: 2021/9/16
CVE: CVE-2020-21594, CVE-2020-21595, CVE-2020-21596, CVE-2020-21597, CVE-2020-21598, CVE-2020-21599, CVE-2020-21600, CVE-2020-21601, CVE-2020-21602, CVE-2020-21603, CVE-2020-21604, CVE-2020-21605, CVE-2020-21606, CVE-2021-35452, CVE-2021-36408, CVE-2021-36409, CVE-2021-36410, CVE-2021-36411, CVE-2022-1253, CVE-2022-43235, CVE-2022-43236, CVE-2022-43237, CVE-2022-43238, CVE-2022-43239, CVE-2022-43240, CVE-2022-43241, CVE-2022-43242, CVE-2022-43243, CVE-2022-43244, CVE-2022-43245, CVE-2022-43248, CVE-2022-43249, CVE-2022-43250, CVE-2022-43252, CVE-2022-43253, CVE-2022-47655