Severity: Medium
ID: 27952
File Name: ubuntu_USN-371-1.nasl
Version: 1.16
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 11/10/2007
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 3.6
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE: p-cpe:/a:canonical:ubuntu_linux:irb1.8, p-cpe:/a:canonical:ubuntu_linux:libbigdecimal-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libcurses-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libdbm-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libdl-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libdrb-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:liberb-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libgdbm-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libiconv-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libopenssl-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libpty-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libracc-runtime-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libreadline-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:librexml-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libruby1.8, p-cpe:/a:canonical:ubuntu_linux:libruby1.8-dbg, p-cpe:/a:canonical:ubuntu_linux:libsdbm-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libsoap-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libstrscan-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libsyslog-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libtcltk-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libtest-unit-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libtk-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libwebrick-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libxmlrpc-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libyaml-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libzlib-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:rdoc1.8, p-cpe:/a:canonical:ubuntu_linux:ri1.8, p-cpe:/a:canonical:ubuntu_linux:ruby1.8, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-dev, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-elisp, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-examples, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10, cpe:/o:canonical:ubuntu_linux:6.06:-:lts, cpe:/o:canonical:ubuntu_linux:6.10
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Ease: No known exploits are available
Patch Publication Date: 11/1/2006
CVE: CVE-2004-0983, CVE-2006-5467
BID: 20777
USN: 371-1