Severity: Medium
ID: 36657
File Name: ubuntu_USN-696-1.nasl
Version: 1.18
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 4/23/2009
Updated: 1/19/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE: p-cpe:/a:canonical:ubuntu_linux:libavahi-qt4-dev, p-cpe:/a:canonical:ubuntu_linux:libavahi-client3, p-cpe:/a:canonical:ubuntu_linux:monodoc-avahi-manual, p-cpe:/a:canonical:ubuntu_linux:libavahi-gobject-dev, p-cpe:/a:canonical:ubuntu_linux:python2.4-avahi, p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-howl-dev, p-cpe:/a:canonical:ubuntu_linux:libavahi-glib-dev, p-cpe:/a:canonical:ubuntu_linux:avahi-dbg, p-cpe:/a:canonical:ubuntu_linux:avahi-discover, p-cpe:/a:canonical:ubuntu_linux:libavahi-ui-dev, p-cpe:/a:canonical:ubuntu_linux:libavahi-qt3-1, p-cpe:/a:canonical:ubuntu_linux:python-avahi, p-cpe:/a:canonical:ubuntu_linux:avahi-daemon, p-cpe:/a:canonical:ubuntu_linux:libavahi-core5, p-cpe:/a:canonical:ubuntu_linux:avahi-utils, p-cpe:/a:canonical:ubuntu_linux:avahi-autoipd, cpe:/o:canonical:ubuntu_linux:6.06:-:lts, p-cpe:/a:canonical:ubuntu_linux:libavahi-core-dev, p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-libdnssd1, p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-libdnssd-dev, cpe:/o:canonical:ubuntu_linux:8.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libavahi-glib1, p-cpe:/a:canonical:ubuntu_linux:libavahi-common-dev, p-cpe:/a:canonical:ubuntu_linux:libavahi-client-dev, p-cpe:/a:canonical:ubuntu_linux:avahi-dnsconfd, p-cpe:/a:canonical:ubuntu_linux:libavahi-cil, p-cpe:/a:canonical:ubuntu_linux:libavahi-qt3-dev, cpe:/o:canonical:ubuntu_linux:7.10, p-cpe:/a:canonical:ubuntu_linux:libavahi-common3, p-cpe:/a:canonical:ubuntu_linux:libavahi-qt4-1, p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-howl0, p-cpe:/a:canonical:ubuntu_linux:libavahi-gobject0, p-cpe:/a:canonical:ubuntu_linux:avahi-ui-utils, p-cpe:/a:canonical:ubuntu_linux:libavahi-ui0, p-cpe:/a:canonical:ubuntu_linux:libavahi-core4, p-cpe:/a:canonical:ubuntu_linux:libavahi-common-data, cpe:/o:canonical:ubuntu_linux:8.10
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/18/2008
CVE: CVE-2007-3372, CVE-2008-5081
BID: 32825