Language:
Severity: High
ID: 151000
File Name: ubuntu_USN-4998-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 6/25/2021
Updated: 8/27/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.1
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS Score Source: CVE-2021-20288
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:python3-rados, p-cpe:/a:canonical:ubuntu_linux:ceph-mds, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-modules-core, p-cpe:/a:canonical:ubuntu_linux:ceph, p-cpe:/a:canonical:ubuntu_linux:ceph-osd, p-cpe:/a:canonical:ubuntu_linux:librados-dev, p-cpe:/a:canonical:ubuntu_linux:python3-rgw, p-cpe:/a:canonical:ubuntu_linux:rados-objclass-dev, p-cpe:/a:canonical:ubuntu_linux:python3-ceph, p-cpe:/a:canonical:ubuntu_linux:ceph-immutable-object-cache, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-k8sevents, p-cpe:/a:canonical:ubuntu_linux:ceph-fuse, p-cpe:/a:canonical:ubuntu_linux:librgw2, p-cpe:/a:canonical:ubuntu_linux:python3-ceph-common, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-dashboard, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-diskprediction-local, p-cpe:/a:canonical:ubuntu_linux:librbd-dev, p-cpe:/a:canonical:ubuntu_linux:libradosstriper-dev, p-cpe:/a:canonical:ubuntu_linux:cephadm, p-cpe:/a:canonical:ubuntu_linux:ceph-common, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr, p-cpe:/a:canonical:ubuntu_linux:python3-ceph-argparse, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-rook, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-diskprediction-cloud, p-cpe:/a:canonical:ubuntu_linux:libcephfs-jni, p-cpe:/a:canonical:ubuntu_linux:libradospp-dev, p-cpe:/a:canonical:ubuntu_linux:libcephfs-dev, p-cpe:/a:canonical:ubuntu_linux:librgw-dev, p-cpe:/a:canonical:ubuntu_linux:ceph-resource-agents, p-cpe:/a:canonical:ubuntu_linux:ceph-mon, p-cpe:/a:canonical:ubuntu_linux:cephfs-shell, p-cpe:/a:canonical:ubuntu_linux:rbd-mirror, p-cpe:/a:canonical:ubuntu_linux:python3-cephfs, p-cpe:/a:canonical:ubuntu_linux:librados2, p-cpe:/a:canonical:ubuntu_linux:ceph-base, p-cpe:/a:canonical:ubuntu_linux:libcephfs-java, p-cpe:/a:canonical:ubuntu_linux:libradosstriper1, p-cpe:/a:canonical:ubuntu_linux:python3-rbd, p-cpe:/a:canonical:ubuntu_linux:ceph-mgr-cephadm, p-cpe:/a:canonical:ubuntu_linux:librbd1, p-cpe:/a:canonical:ubuntu_linux:radosgw, p-cpe:/a:canonical:ubuntu_linux:libcephfs2, p-cpe:/a:canonical:ubuntu_linux:rbd-nbd, p-cpe:/a:canonical:ubuntu_linux:rbd-fuse, cpe:/o:canonical:ubuntu_linux:20.04:-:lts
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/25/2021
Vulnerability Publication Date: 12/18/2020
CVE: CVE-2020-25678, CVE-2020-27781, CVE-2020-27839, CVE-2021-20288, CVE-2021-3509, CVE-2021-3524, CVE-2021-3531
USN: 4998-1