Severity: Medium
ID: 214326
File Name: ubuntu_USN-7213-1.nasl
Version: 1.1
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 1/17/2025
Updated: 1/17/2025
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Factor: Low
Score: 2.2
Risk Factor: Low
Base Score: 3.2
Temporal Score: 2.4
Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:N/A:P
CVSS Score Source: CVE-2024-56378
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libpoppler-glib8, p-cpe:/a:canonical:ubuntu_linux:libpoppler-dev, p-cpe:/a:canonical:ubuntu_linux:libpoppler-glib-dev, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt4-dev, p-cpe:/a:canonical:ubuntu_linux:poppler-utils, p-cpe:/a:canonical:ubuntu_linux:libpoppler58, p-cpe:/a:canonical:ubuntu_linux:libpoppler-cpp0, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt4-4, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt5-1, p-cpe:/a:canonical:ubuntu_linux:libpoppler73, p-cpe:/a:canonical:ubuntu_linux:libpoppler-cpp0v5, p-cpe:/a:canonical:ubuntu_linux:libpoppler-cpp-dev, p-cpe:/a:canonical:ubuntu_linux:gir1.2-poppler-0.18, p-cpe:/a:canonical:ubuntu_linux:libpoppler-private-dev, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt5-dev, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libpoppler118, p-cpe:/a:canonical:ubuntu_linux:libpoppler97, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt6-dev, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libpoppler-cpp0t64, p-cpe:/a:canonical:ubuntu_linux:libpoppler-glib8t64, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt5-1t64, p-cpe:/a:canonical:ubuntu_linux:libpoppler-qt6-3t64, p-cpe:/a:canonical:ubuntu_linux:libpoppler134, cpe:/o:canonical:ubuntu_linux:24.10, p-cpe:/a:canonical:ubuntu_linux:libpoppler-cpp1, p-cpe:/a:canonical:ubuntu_linux:libpoppler140
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Ease: No known exploits are available
Patch Publication Date: 1/16/2025
Vulnerability Publication Date: 12/22/2024
CVE: CVE-2024-56378
USN: 7213-1