Language:
Severity: Critical
ID: 170001
File Name: ubuntu_USN-5800-1.nasl
Version: 1.2
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 1/12/2023
Updated: 8/27/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-44640
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:heimdal-servers-x, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:heimdal-kcm, p-cpe:/a:canonical:ubuntu_linux:heimdal-dev, p-cpe:/a:canonical:ubuntu_linux:libgssapi3-heimdal, cpe:/o:canonical:ubuntu_linux:16.04:-:esm, p-cpe:/a:canonical:ubuntu_linux:libhdb9-heimdal, p-cpe:/a:canonical:ubuntu_linux:libkadm5srv8-heimdal, p-cpe:/a:canonical:ubuntu_linux:libhcrypto4-heimdal, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libotp0-heimdal, p-cpe:/a:canonical:ubuntu_linux:libkadm5clnt7-heimdal, p-cpe:/a:canonical:ubuntu_linux:heimdal-servers, p-cpe:/a:canonical:ubuntu_linux:heimdal-multidev, p-cpe:/a:canonical:ubuntu_linux:libasn1-8-heimdal, p-cpe:/a:canonical:ubuntu_linux:libwind0-heimdal, p-cpe:/a:canonical:ubuntu_linux:heimdal-clients, p-cpe:/a:canonical:ubuntu_linux:libheimbase1-heimdal, p-cpe:/a:canonical:ubuntu_linux:libhx509-5-heimdal, p-cpe:/a:canonical:ubuntu_linux:libroken18-heimdal, p-cpe:/a:canonical:ubuntu_linux:libkrb5-26-heimdal, p-cpe:/a:canonical:ubuntu_linux:libsl0-heimdal, p-cpe:/a:canonical:ubuntu_linux:libkafs0-heimdal, p-cpe:/a:canonical:ubuntu_linux:libkdc2-heimdal, p-cpe:/a:canonical:ubuntu_linux:libheimntlm0-heimdal, p-cpe:/a:canonical:ubuntu_linux:heimdal-kdc, p-cpe:/a:canonical:ubuntu_linux:heimdal-clients-x
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/12/2023
Vulnerability Publication Date: 10/25/2022
CVE: CVE-2021-44758, CVE-2022-3437, CVE-2022-42898, CVE-2022-44640
USN: 5800-1