語系:
https://alas.aws.amazon.com/AL2/ALASMARIADB10.5-2023-003.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-2372.html
https://alas.aws.amazon.com/cve/html/CVE-2021-2389.html
https://alas.aws.amazon.com/cve/html/CVE-2021-35604.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46657.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46658.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46659.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46661.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46662.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46663.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46664.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46665.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46666.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46667.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46668.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46669.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0778.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21595.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24048.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24050.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24051.html
https://alas.aws.amazon.com/cve/html/CVE-2022-24052.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27376.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27377.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27378.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27379.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27380.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27381.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27382.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27383.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27384.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27385.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27386.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27387.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27444.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27445.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27446.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27447.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27448.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27449.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27451.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27452.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27455.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27456.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27457.html
https://alas.aws.amazon.com/cve/html/CVE-2022-27458.html
https://alas.aws.amazon.com/cve/html/CVE-2022-31622.html
https://alas.aws.amazon.com/cve/html/CVE-2022-31623.html
https://alas.aws.amazon.com/cve/html/CVE-2022-31624.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32081.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32082.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32083.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32084.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32085.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32086.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32087.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32088.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32089.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32091.html
嚴重性: High
ID: 181931
檔案名稱: al2_ALASMARIADB10_5-2023-003.nasl
版本: 1.3
類型: local
代理程式: unix
已發布: 2023/9/27
已更新: 2024/1/23
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
風險因素: Medium
分數: 5.9
風險因素: High
基本分數: 7.5
時間分數: 5.9
媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 評分資料來源: CVE-2022-32081
風險因素: High
基本分數: 7.8
時間分數: 7
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2022-24052
CPE: p-cpe:/a:amazon:linux:mariadb-common, p-cpe:/a:amazon:linux:mariadb-connect-engine, p-cpe:/a:amazon:linux:mariadb-debuginfo, p-cpe:/a:amazon:linux:mariadb-embedded-devel, p-cpe:/a:amazon:linux:mariadb-s3-engine, p-cpe:/a:amazon:linux:mariadb-embedded, p-cpe:/a:amazon:linux:mariadb-sphinx-engine, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:mariadb-libs, p-cpe:/a:amazon:linux:mariadb-oqgraph-engine, p-cpe:/a:amazon:linux:mariadb-rocksdb-engine, p-cpe:/a:amazon:linux:mariadb-server-utils, p-cpe:/a:amazon:linux:mariadb-cracklib-password-check, p-cpe:/a:amazon:linux:mariadb-pam, p-cpe:/a:amazon:linux:mariadb, p-cpe:/a:amazon:linux:mariadb-config, p-cpe:/a:amazon:linux:mariadb-server-galera, p-cpe:/a:amazon:linux:mariadb-gssapi-server, p-cpe:/a:amazon:linux:mariadb-errmsg, p-cpe:/a:amazon:linux:mariadb-backup, p-cpe:/a:amazon:linux:mariadb-devel, p-cpe:/a:amazon:linux:mariadb-server, p-cpe:/a:amazon:linux:mariadb-test
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2023/8/21
弱點發布日期: 2021/7/20
CVE: CVE-2021-2372, CVE-2021-2389, CVE-2021-35604, CVE-2021-46657, CVE-2021-46658, CVE-2021-46659, CVE-2021-46661, CVE-2021-46662, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46666, CVE-2021-46667, CVE-2021-46668, CVE-2021-46669, CVE-2022-0778, CVE-2022-21595, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-27376, CVE-2022-27377, CVE-2022-27378, CVE-2022-27379, CVE-2022-27380, CVE-2022-27381, CVE-2022-27382, CVE-2022-27383, CVE-2022-27384, CVE-2022-27385, CVE-2022-27386, CVE-2022-27387, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-27458, CVE-2022-31622, CVE-2022-31623, CVE-2022-31624, CVE-2022-32081, CVE-2022-32082, CVE-2022-32083, CVE-2022-32084, CVE-2022-32085, CVE-2022-32086, CVE-2022-32087, CVE-2022-32088, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2023-5157