Language:
http://www.nessus.org/u?df45ea47
http://www.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=533125
https://bugzilla.redhat.com/show_bug.cgi?id=618290
https://bugzilla.redhat.com/show_bug.cgi?id=639876
https://bugzilla.redhat.com/show_bug.cgi?id=639880
https://bugzilla.redhat.com/show_bug.cgi?id=639897
https://bugzilla.redhat.com/show_bug.cgi?id=639904
https://bugzilla.redhat.com/show_bug.cgi?id=639909
https://bugzilla.redhat.com/show_bug.cgi?id=639914
https://bugzilla.redhat.com/show_bug.cgi?id=639920
https://bugzilla.redhat.com/show_bug.cgi?id=639922
https://bugzilla.redhat.com/show_bug.cgi?id=639925
https://bugzilla.redhat.com/show_bug.cgi?id=642167
https://bugzilla.redhat.com/show_bug.cgi?id=642180
https://bugzilla.redhat.com/show_bug.cgi?id=642187
https://bugzilla.redhat.com/show_bug.cgi?id=642197
https://bugzilla.redhat.com/show_bug.cgi?id=642202
https://bugzilla.redhat.com/show_bug.cgi?id=642215
https://access.redhat.com/errata/RHSA-2010:0768
https://access.redhat.com/kb/docs/DOC-20491
Severity: Critical
ID: 49974
File Name: redhat-RHSA-2010-0768.nasl
Version: 1.29
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/14/2010
Updated: 11/4/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 8.9
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2010-3574
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2009-3555
CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-devel, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-openjdk-src
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/13/2010
Vulnerability Publication Date: 11/9/2009
CVE: CVE-2009-3555, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3551, CVE-2010-3553, CVE-2010-3554, CVE-2010-3557, CVE-2010-3561, CVE-2010-3562, CVE-2010-3564, CVE-2010-3565, CVE-2010-3567, CVE-2010-3568, CVE-2010-3569, CVE-2010-3573, CVE-2010-3574
BID: 36935, 43963, 43979, 43985, 43992, 43994, 44009, 44011, 44012, 44013, 44014, 44016, 44017, 44027, 44028, 44032, 44035