Language:
https://lists.debian.org/debian-lts-announce/2020/08/msg00005.html
https://packages.debian.org/source/stretch/evolution-data-server
Severity: Medium
ID: 139252
File Name: debian_DLA-2309.nasl
Version: 1.4
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 8/3/2020
Updated: 2/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2020-16117
Risk Factor: Medium
Base Score: 5.9
Temporal Score: 5.3
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libebook1.2-dev, p-cpe:/a:debian:debian_linux:libedata-book1.2-dev, p-cpe:/a:debian:debian_linux:libedata-cal-1.2-28, p-cpe:/a:debian:debian_linux:libedata-book-1.2-25, cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:libecal1.2-dev, p-cpe:/a:debian:debian_linux:libedataserverui-1.2-1, p-cpe:/a:debian:debian_linux:libedataserverui1.2-dev, p-cpe:/a:debian:debian_linux:libedataserver-1.2-22, p-cpe:/a:debian:debian_linux:evolution-data-server-dev, p-cpe:/a:debian:debian_linux:libebook-contacts-1.2-2, p-cpe:/a:debian:debian_linux:libedataserver1.2-dev, p-cpe:/a:debian:debian_linux:gir1.2-ebookcontacts-1.2, p-cpe:/a:debian:debian_linux:libcamel-1.2-59, p-cpe:/a:debian:debian_linux:libedata-cal1.2-dev, p-cpe:/a:debian:debian_linux:gir1.2-edataserver-1.2, p-cpe:/a:debian:debian_linux:libebook-contacts1.2-dev, p-cpe:/a:debian:debian_linux:gir1.2-ebook-1.2, p-cpe:/a:debian:debian_linux:evolution-data-server-common, p-cpe:/a:debian:debian_linux:libebackend-1.2-10, p-cpe:/a:debian:debian_linux:evolution-data-server-doc, p-cpe:/a:debian:debian_linux:evolution-data-server, p-cpe:/a:debian:debian_linux:libcamel1.2-dev, p-cpe:/a:debian:debian_linux:libebook-1.2-16, p-cpe:/a:debian:debian_linux:libecal-1.2-19, p-cpe:/a:debian:debian_linux:libebackend1.2-dev
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/2/2020
Vulnerability Publication Date: 7/29/2020
CVE: CVE-2020-16117