Language:
Severity: Medium
ID: 172227
File Name: ubuntu_USN-5928-1.nasl
Version: 1.3
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 3/7/2023
Updated: 8/28/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N
CVSS Score Source: CVE-2022-4415
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:libnss-resolve, p-cpe:/a:canonical:ubuntu_linux:libsystemd0, p-cpe:/a:canonical:ubuntu_linux:libgudev-1.0-0, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libgudev-1.0-dev, p-cpe:/a:canonical:ubuntu_linux:libnss-myhostname, p-cpe:/a:canonical:ubuntu_linux:libsystemd-journal-dev, p-cpe:/a:canonical:ubuntu_linux:systemd-coredump, p-cpe:/a:canonical:ubuntu_linux:libpam-systemd, p-cpe:/a:canonical:ubuntu_linux:python-systemd, p-cpe:/a:canonical:ubuntu_linux:systemd, cpe:/o:canonical:ubuntu_linux:16.04:-:esm, p-cpe:/a:canonical:ubuntu_linux:udev, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libsystemd-journal0, p-cpe:/a:canonical:ubuntu_linux:libsystemd-login-dev, p-cpe:/a:canonical:ubuntu_linux:systemd-standalone-sysusers, p-cpe:/a:canonical:ubuntu_linux:systemd-timesyncd, p-cpe:/a:canonical:ubuntu_linux:gir1.2-gudev-1.0, p-cpe:/a:canonical:ubuntu_linux:systemd-container, p-cpe:/a:canonical:ubuntu_linux:libsystemd-login0, p-cpe:/a:canonical:ubuntu_linux:systemd-repart, p-cpe:/a:canonical:ubuntu_linux:libsystemd-dev, p-cpe:/a:canonical:ubuntu_linux:libudev1, p-cpe:/a:canonical:ubuntu_linux:systemd-journal-remote, p-cpe:/a:canonical:ubuntu_linux:systemd-oomd, p-cpe:/a:canonical:ubuntu_linux:libsystemd-daemon-dev, p-cpe:/a:canonical:ubuntu_linux:systemd-standalone-tmpfiles, p-cpe:/a:canonical:ubuntu_linux:libnss-systemd, p-cpe:/a:canonical:ubuntu_linux:systemd-services, p-cpe:/a:canonical:ubuntu_linux:libsystemd-id128-0, p-cpe:/a:canonical:ubuntu_linux:systemd-tests, p-cpe:/a:canonical:ubuntu_linux:libudev-dev, p-cpe:/a:canonical:ubuntu_linux:systemd-sysv, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libnss-mymachines, p-cpe:/a:canonical:ubuntu_linux:libsystemd-daemon0, p-cpe:/a:canonical:ubuntu_linux:libsystemd-id128-dev
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/7/2023
Vulnerability Publication Date: 11/4/2022
CVE: CVE-2022-3821, CVE-2022-4415, CVE-2022-45873
USN: 5928-1