Language:
Severity: High
ID: 109650
File Name: ubuntu_USN-3641-1.nasl
Version: 1.16
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 5/9/2018
Updated: 8/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2018-8897
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-powerpc64-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1092-snapdragon, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1019-aws, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1023-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-powerpc64-emb, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-41-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-powerpc-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-41-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-powerpc64-emb, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-1026-oem, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-powerpc-e500, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-lowlatency, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1089-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-1015-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-41-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1057-aws, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-powerpc-e500mc, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13.0-1016-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-powerpc64-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-124-powerpc-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13.0-147-powerpc-e500mc, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-9027-euclid
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/8/2018
Vulnerability Publication Date: 5/8/2018
Metasploit (Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability)
CVE: CVE-2018-1000199, CVE-2018-1087, CVE-2018-8897
USN: 3641-1