Language:
Severity: High
ID: 173946
File Name: ubuntu_USN-6001-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 4/6/2023
Updated: 8/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.5
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSS Score Source: CVE-2021-3772
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2023-1118
CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1155-aws, cpe:/o:canonical:ubuntu_linux:16.04:-:esm
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/6/2023
Vulnerability Publication Date: 9/30/2021
CVE: CVE-2020-36516, CVE-2021-26401, CVE-2021-28712, CVE-2021-28713, CVE-2021-3428, CVE-2021-3659, CVE-2021-3669, CVE-2021-3732, CVE-2021-3772, CVE-2021-4149, CVE-2021-4203, CVE-2021-45868, CVE-2022-0487, CVE-2022-0494, CVE-2022-0617, CVE-2022-1016, CVE-2022-1195, CVE-2022-1205, CVE-2022-1462, CVE-2022-1516, CVE-2022-1974, CVE-2022-1975, CVE-2022-20132, CVE-2022-20572, CVE-2022-2318, CVE-2022-2380, CVE-2022-2503, CVE-2022-2663, CVE-2022-2991, CVE-2022-3061, CVE-2022-3111, CVE-2022-3303, CVE-2022-3628, CVE-2022-36280, CVE-2022-3646, CVE-2022-36879, CVE-2022-3903, CVE-2022-39188, CVE-2022-41218, CVE-2022-41849, CVE-2022-41850, CVE-2022-4662, CVE-2022-47929, CVE-2023-0394, CVE-2023-1074, CVE-2023-1095, CVE-2023-1118, CVE-2023-23455, CVE-2023-26545, CVE-2023-26607
USN: 6001-1