Language:
Severity: Medium
ID: 171251
File Name: ubuntu_USN-5835-5.nasl
Version: 1.4
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 2/9/2023
Updated: 10/29/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N
CVSS Score Source: CVE-2022-47951
Risk Factor: Medium
Base Score: 5.7
Temporal Score: 5.1
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:nova-common, p-cpe:/a:canonical:ubuntu_linux:nova-console, p-cpe:/a:canonical:ubuntu_linux:nova-network, p-cpe:/a:canonical:ubuntu_linux:nova-compute-lxc, p-cpe:/a:canonical:ubuntu_linux:nova-novncproxy, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:nova-compute-qemu, p-cpe:/a:canonical:ubuntu_linux:nova-xvpvncproxy, p-cpe:/a:canonical:ubuntu_linux:nova-compute-xen, p-cpe:/a:canonical:ubuntu_linux:nova-consoleauth, p-cpe:/a:canonical:ubuntu_linux:nova-api-os-volume, p-cpe:/a:canonical:ubuntu_linux:nova-compute-libvirt, p-cpe:/a:canonical:ubuntu_linux:nova-api, p-cpe:/a:canonical:ubuntu_linux:nova-ajax-console-proxy, p-cpe:/a:canonical:ubuntu_linux:nova-cells, p-cpe:/a:canonical:ubuntu_linux:nova-compute, p-cpe:/a:canonical:ubuntu_linux:python-nova, p-cpe:/a:canonical:ubuntu_linux:nova-api-metadata, p-cpe:/a:canonical:ubuntu_linux:nova-scheduler, p-cpe:/a:canonical:ubuntu_linux:nova-compute-vmware, p-cpe:/a:canonical:ubuntu_linux:nova-placement-api, p-cpe:/a:canonical:ubuntu_linux:nova-serialproxy, p-cpe:/a:canonical:ubuntu_linux:nova-volume, p-cpe:/a:canonical:ubuntu_linux:nova-api-os-compute, p-cpe:/a:canonical:ubuntu_linux:nova-conductor, p-cpe:/a:canonical:ubuntu_linux:nova-compute-kvm, p-cpe:/a:canonical:ubuntu_linux:nova-spiceproxy
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/9/2023
Vulnerability Publication Date: 1/26/2023
CVE: CVE-2022-47951
USN: 5835-5