語系:
https://alas.aws.amazon.com/AL2023/ALAS-2023-070.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-26341.html
https://alas.aws.amazon.com/cve/html/CVE-2021-26401.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0001.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0002.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0171.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0185.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0500.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0742.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0847.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0854.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1015.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1016.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1055.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1158.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1184.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1199.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1263.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1353.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1462.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1679.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1729.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1789.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1852.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1966.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1972.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1973.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2078.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2585.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2588.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2602.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2663.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2905.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3028.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3061.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3176.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3303.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3435.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3523.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3524.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3534.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3543.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3566.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3567.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3606.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3623.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3643.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4139.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4378.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4379.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4842.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48619.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21123.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21125.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21166.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21505.html
https://alas.aws.amazon.com/cve/html/CVE-2022-23222.html
https://alas.aws.amazon.com/cve/html/CVE-2022-23816.html
https://alas.aws.amazon.com/cve/html/CVE-2022-23825.html
https://alas.aws.amazon.com/cve/html/CVE-2022-23960.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24958.html
https://alas.aws.amazon.com/cve/html/CVE-2022-25636.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26373.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27223.html
https://alas.aws.amazon.com/cve/html/CVE-2022-28693.html
https://alas.aws.amazon.com/cve/html/CVE-2022-28893.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29156.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29581.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29582.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29900.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29901.html
https://alas.aws.amazon.com/cve/html/CVE-2022-30594.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32250.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32981.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34494.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34495.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3522.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36123.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36879.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36946.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39188.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39189.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39190.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39842.html
https://alas.aws.amazon.com/cve/html/CVE-2022-40307.html
https://alas.aws.amazon.com/cve/html/CVE-2022-42328.html
https://alas.aws.amazon.com/cve/html/CVE-2022-42329.html
https://alas.aws.amazon.com/cve/html/CVE-2022-43750.html
https://alas.aws.amazon.com/cve/html/CVE-2022-43945.html
https://alas.aws.amazon.com/cve/html/CVE-2022-45869.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0179.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0394.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0459.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0461.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0469.html
https://alas.aws.amazon.com/cve/html/CVE-2023-0590.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1637.html
https://alas.aws.amazon.com/cve/html/CVE-2023-2019.html
https://alas.aws.amazon.com/cve/html/CVE-2023-2177.html
https://alas.aws.amazon.com/cve/html/CVE-2023-26544.html
https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
https://alas.aws.amazon.com/cve/html/CVE-2023-3357.html
https://alas.aws.amazon.com/cve/html/CVE-2023-4387.html
https://alas.aws.amazon.com/cve/html/CVE-2023-4459.html
https://alas.aws.amazon.com/cve/html/CVE-2024-0562.html
嚴重性: High
ID: 173106
檔案名稱: al2023_ALAS2023-2023-070.nasl
版本: 1.20
類型: local
代理程式: unix
已發布: 2023/3/21
已更新: 2024/8/22
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Critical
分數: 9.8
風險因素: High
基本分數: 7.2
時間分數: 6.3
媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-34918
風險因素: High
基本分數: 8.8
時間分數: 8.4
媒介: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CVSS 評分資料來源: CVE-2022-27223
CPE: p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.10-15.42, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2023/2/17
弱點發布日期: 2022/1/14
CISA 已知遭惡意利用弱點到期日: 2022/5/16, 2024/7/17, 2024/9/11
CANVAS (CANVAS)
Core Impact
Metasploit (Netfilter nft_set_elem_init Heap Overflow Privilege Escalation)
CVE: CVE-2021-26341, CVE-2021-26401, CVE-2022-0001, CVE-2022-0002, CVE-2022-0171, CVE-2022-0185, CVE-2022-0492, CVE-2022-0494, CVE-2022-0500, CVE-2022-0742, CVE-2022-0847, CVE-2022-0854, CVE-2022-1015, CVE-2022-1016, CVE-2022-1055, CVE-2022-1158, CVE-2022-1184, CVE-2022-1199, CVE-2022-1263, CVE-2022-1353, CVE-2022-1462, CVE-2022-1679, CVE-2022-1729, CVE-2022-1789, CVE-2022-1852, CVE-2022-1966, CVE-2022-1972, CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-21505, CVE-2022-23222, CVE-2022-23816, CVE-2022-23825, CVE-2022-23960, CVE-2022-24958, CVE-2022-25636, CVE-2022-2585, CVE-2022-2586, CVE-2022-2588, CVE-2022-2602, CVE-2022-26365, CVE-2022-26373, CVE-2022-2663, CVE-2022-27223, CVE-2022-28693, CVE-2022-28893, CVE-2022-2905, CVE-2022-29156, CVE-2022-29581, CVE-2022-29582, CVE-2022-29900, CVE-2022-29901, CVE-2022-3028, CVE-2022-30594, CVE-2022-3061, CVE-2022-3176, CVE-2022-32250, CVE-2022-32981, CVE-2022-3303, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-33743, CVE-2022-3435, CVE-2022-34494, CVE-2022-34495, CVE-2022-34918, CVE-2022-3522, CVE-2022-3523, CVE-2022-3524, CVE-2022-3534, CVE-2022-3543, CVE-2022-3566, CVE-2022-3567, CVE-2022-3606, CVE-2022-36123, CVE-2022-3623, CVE-2022-3643, CVE-2022-36879, CVE-2022-36946, CVE-2022-39188, CVE-2022-39189, CVE-2022-39190, CVE-2022-39842, CVE-2022-40307, CVE-2022-4139, CVE-2022-42328, CVE-2022-42329, CVE-2022-43750, CVE-2022-4378, CVE-2022-4379, CVE-2022-43945, CVE-2022-45869, CVE-2022-4842, CVE-2022-48619, CVE-2023-0179, CVE-2023-0394, CVE-2023-0459, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-1637, CVE-2023-2019, CVE-2023-2177, CVE-2023-26544, CVE-2023-3111, CVE-2023-3357, CVE-2023-4387, CVE-2023-4459, CVE-2024-0562