Language:
Severity: High
ID: 170923
File Name: ubuntu_USN-4781-2.nasl
Version: 1.3
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 2/1/2023
Updated: 10/29/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.6
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-10030
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:slurm-client-emulator, p-cpe:/a:canonical:ubuntu_linux:libslurm29, p-cpe:/a:canonical:ubuntu_linux:libslurmdb26, p-cpe:/a:canonical:ubuntu_linux:slurm-wlm-basic-plugins, p-cpe:/a:canonical:ubuntu_linux:libslurmdb29, p-cpe:/a:canonical:ubuntu_linux:libslurmdb-perl, p-cpe:/a:canonical:ubuntu_linux:slurm-wlm-torque, p-cpe:/a:canonical:ubuntu_linux:slurm-wlm-emulator, p-cpe:/a:canonical:ubuntu_linux:libpam-slurm, cpe:/o:canonical:ubuntu_linux:16.04:-:esm, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl-torque, p-cpe:/a:canonical:ubuntu_linux:libslurmdb-dev, p-cpe:/a:canonical:ubuntu_linux:libpmi0, p-cpe:/a:canonical:ubuntu_linux:slurmctld, p-cpe:/a:canonical:ubuntu_linux:libslurm-dev, p-cpe:/a:canonical:ubuntu_linux:slurmdbd, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl, p-cpe:/a:canonical:ubuntu_linux:libpmi0-dev, p-cpe:/a:canonical:ubuntu_linux:libslurm-perl, p-cpe:/a:canonical:ubuntu_linux:slurm-wlm-basic-plugins-dev, p-cpe:/a:canonical:ubuntu_linux:libslurm26, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl-basic-plugins-dev, p-cpe:/a:canonical:ubuntu_linux:slurm-wlm, p-cpe:/a:canonical:ubuntu_linux:slurm-client, p-cpe:/a:canonical:ubuntu_linux:sview, p-cpe:/a:canonical:ubuntu_linux:slurmd, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl-slurmdbd, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl-basic-plugins, p-cpe:/a:canonical:ubuntu_linux:slurm-llnl-sview
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Ease: No known exploits are available
Patch Publication Date: 2/1/2023
Vulnerability Publication Date: 1/5/2017
CVE: CVE-2016-10030, CVE-2018-10995
USN: 4781-2