語言:
https://access.redhat.com/security/updates/classification/#important
http://www.nessus.org/u?0f8bc6d8
https://access.redhat.com/knowledge/docs/
https://bugzilla.redhat.com/show_bug.cgi?id=855264
https://bugzilla.redhat.com/show_bug.cgi?id=864921
https://bugzilla.redhat.com/show_bug.cgi?id=872415
https://bugzilla.redhat.com/show_bug.cgi?id=873765
https://bugzilla.redhat.com/show_bug.cgi?id=873768
https://bugzilla.redhat.com/show_bug.cgi?id=874511
https://bugzilla.redhat.com/show_bug.cgi?id=874750
https://bugzilla.redhat.com/show_bug.cgi?id=874751
https://bugzilla.redhat.com/show_bug.cgi?id=874757
https://bugzilla.redhat.com/show_bug.cgi?id=874799
https://bugzilla.redhat.com/show_bug.cgi?id=874845
https://bugzilla.redhat.com/show_bug.cgi?id=875657
https://bugzilla.redhat.com/show_bug.cgi?id=876324
https://bugzilla.redhat.com/show_bug.cgi?id=876465
https://bugzilla.redhat.com/show_bug.cgi?id=876644
https://bugzilla.redhat.com/show_bug.cgi?id=876937
https://bugzilla.redhat.com/show_bug.cgi?id=876939
https://bugzilla.redhat.com/show_bug.cgi?id=877158
https://bugzilla.redhat.com/show_bug.cgi?id=877407
https://bugzilla.redhat.com/show_bug.cgi?id=883527
https://bugzilla.redhat.com/show_bug.cgi?id=885587
https://bugzilla.redhat.com/show_bug.cgi?id=885598
https://bugzilla.redhat.com/show_bug.cgi?id=886159
https://bugzilla.redhat.com/show_bug.cgi?id=888043
https://bugzilla.redhat.com/show_bug.cgi?id=888056
https://bugzilla.redhat.com/show_bug.cgi?id=888671
https://bugzilla.redhat.com/show_bug.cgi?id=889062
https://bugzilla.redhat.com/show_bug.cgi?id=889088
https://bugzilla.redhat.com/show_bug.cgi?id=889095
https://bugzilla.redhat.com/show_bug.cgi?id=889125
https://bugzilla.redhat.com/show_bug.cgi?id=889649
https://bugzilla.redhat.com/show_bug.cgi?id=890607
https://bugzilla.redhat.com/show_bug.cgi?id=890608
https://bugzilla.redhat.com/show_bug.cgi?id=890612
https://bugzilla.redhat.com/show_bug.cgi?id=892781
https://bugzilla.redhat.com/show_bug.cgi?id=892795
https://bugzilla.redhat.com/show_bug.cgi?id=892990
https://bugzilla.redhat.com/show_bug.cgi?id=893288
https://bugzilla.redhat.com/show_bug.cgi?id=893307
https://bugzilla.redhat.com/show_bug.cgi?id=893895
https://bugzilla.redhat.com/show_bug.cgi?id=896406
嚴重性: Medium
ID: 312025
檔案名稱: rhcos-RHSA-2013-0220.nasl
版本: 1.1
類型: Local
代理程式: unix
已發布: 2026/5/4
已更新: 2026/5/4
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: Medium
分數: 6.7
Vendor Severity: Important
風險因素: High
基本分數: 7.5
時間性分數: 5.9
媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 評分資料來源: CVE-2012-6496
風險因素: Low
基本分數: 3.7
時間性分數: 3.4
媒介: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2013-0158
風險因素: Medium
Base Score: 6.3
Threat Score: 2.9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS 評分資料來源: CVE-2012-6072
CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-auth-remote-user, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-activerecord-doc, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-passenger, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-passenger-native, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-ruby-1.9-scl, p-cpe:/a:redhat:enterprise_linux:openshift-origin-port-proxy, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-common, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-passenger-devel, p-cpe:/a:redhat:enterprise_linux:openshift-console, p-cpe:/a:redhat:enterprise_linux:mongodb-server, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-dns-bind, p-cpe:/a:redhat:enterprise_linux:libmongodb, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:rubygem-activerecord, p-cpe:/a:redhat:enterprise_linux:ruby193-mod_passenger, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-ruby-1.8, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy-1.4, p-cpe:/a:redhat:enterprise_linux:mongodb-devel, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:openshift-origin-msg-node-mcollective, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-activerecord, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console-doc, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-passenger-native-libs, p-cpe:/a:redhat:enterprise_linux:mongodb, cpe:/o:redhat:enterprise_linux:6:coreos, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-msg-broker-mcollective, p-cpe:/a:redhat:enterprise_linux:ruby193-rubygem-passenger-doc
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/1/31
弱點發布日期: 2012/11/23
CVE: CVE-2012-5658, CVE-2012-6072, CVE-2012-6073, CVE-2012-6074, CVE-2012-6496, CVE-2013-0158, CVE-2013-0164