Severity: High
ID: 21072
File Name: ubuntu_USN-260-1.nasl
Version: 1.17
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 3/13/2006
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.5
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:canonical:ubuntu_linux:cpp-3.3, p-cpe:/a:canonical:ubuntu_linux:cpp-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:cpp-3.4, p-cpe:/a:canonical:ubuntu_linux:cpp-3.4-doc, p-cpe:/a:canonical:ubuntu_linux:fastjar, p-cpe:/a:canonical:ubuntu_linux:fixincludes, p-cpe:/a:canonical:ubuntu_linux:flex, p-cpe:/a:canonical:ubuntu_linux:flex-doc, p-cpe:/a:canonical:ubuntu_linux:g%2b%2b-3.3, p-cpe:/a:canonical:ubuntu_linux:g%2b%2b-3.4, p-cpe:/a:canonical:ubuntu_linux:g77-3.3, p-cpe:/a:canonical:ubuntu_linux:g77-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:g77-3.4, p-cpe:/a:canonical:ubuntu_linux:g77-3.4-doc, p-cpe:/a:canonical:ubuntu_linux:gcc-3.4-doc, p-cpe:/a:canonical:ubuntu_linux:gcj-3.3, p-cpe:/a:canonical:ubuntu_linux:gcj-3.4, p-cpe:/a:canonical:ubuntu_linux:gij-3.3, p-cpe:/a:canonical:ubuntu_linux:gij-3.4, p-cpe:/a:canonical:ubuntu_linux:gnat-3.3, p-cpe:/a:canonical:ubuntu_linux:gnat-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:gnat-3.4, p-cpe:/a:canonical:ubuntu_linux:gnat-3.4-doc, p-cpe:/a:canonical:ubuntu_linux:gobjc-3.3, p-cpe:/a:canonical:ubuntu_linux:gobjc-3.4, p-cpe:/a:canonical:ubuntu_linux:gpc-2.1-3.3, p-cpe:/a:canonical:ubuntu_linux:gpc-2.1-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:gpc-2.1-3.4, p-cpe:/a:canonical:ubuntu_linux:gpc-2.1-3.4-doc, p-cpe:/a:canonical:ubuntu_linux:lib32g2c0, p-cpe:/a:canonical:ubuntu_linux:lib32gcc1, p-cpe:/a:canonical:ubuntu_linux:lib32stdc%2b%2b5, p-cpe:/a:canonical:ubuntu_linux:lib32stdc%2b%2b6-0, p-cpe:/a:canonical:ubuntu_linux:lib64g2c0, p-cpe:/a:canonical:ubuntu_linux:lib64gcc1, p-cpe:/a:canonical:ubuntu_linux:lib64stdc%2b%2b6, p-cpe:/a:canonical:ubuntu_linux:libffi2, p-cpe:/a:canonical:ubuntu_linux:libffi2-dev, p-cpe:/a:canonical:ubuntu_linux:libffi3, p-cpe:/a:canonical:ubuntu_linux:libffi3-dev, p-cpe:/a:canonical:ubuntu_linux:libg2c0, p-cpe:/a:canonical:ubuntu_linux:libg2c0-dev, p-cpe:/a:canonical:ubuntu_linux:libgcc1, p-cpe:/a:canonical:ubuntu_linux:libgcj-common, p-cpe:/a:canonical:ubuntu_linux:gcc-3.3, p-cpe:/a:canonical:ubuntu_linux:gcc-3.3-base, p-cpe:/a:canonical:ubuntu_linux:gcc-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:gcc-3.4, p-cpe:/a:canonical:ubuntu_linux:gcc-3.4-base, p-cpe:/a:canonical:ubuntu_linux:libgcj4, p-cpe:/a:canonical:ubuntu_linux:libgcj4-awt, p-cpe:/a:canonical:ubuntu_linux:libgcj4-common, p-cpe:/a:canonical:ubuntu_linux:libgcj4-dev, p-cpe:/a:canonical:ubuntu_linux:libgcj5, p-cpe:/a:canonical:ubuntu_linux:libgcj5-awt, p-cpe:/a:canonical:ubuntu_linux:libgcj5-common, p-cpe:/a:canonical:ubuntu_linux:libgcj5-dev, p-cpe:/a:canonical:ubuntu_linux:libgnat-3.4, p-cpe:/a:canonical:ubuntu_linux:libobjc1, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b5, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b5-3.3-dbg, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b5-3.3-dev, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b5-3.3-doc, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b5-3.3-pic, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-0, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-0-dbg, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-0-dev, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-0-pic, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-dbg, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-dev, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-doc, p-cpe:/a:canonical:ubuntu_linux:libstdc%2b%2b6-pic, p-cpe:/a:canonical:ubuntu_linux:protoize, p-cpe:/a:canonical:ubuntu_linux:treelang-3.3, p-cpe:/a:canonical:ubuntu_linux:treelang-3.4, cpe:/o:canonical:ubuntu_linux:4.10, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Ease: No known exploits are available
Patch Publication Date: 3/7/2006
Vulnerability Publication Date: 2/22/2006
CVE: CVE-2006-0459