Severity: Medium
ID: 40329
File Name: ubuntu_USN-805-1.nasl
Version: 1.16
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 7/21/2009
Updated: 1/19/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:canonical:ubuntu_linux:ruby1.9-dev, p-cpe:/a:canonical:ubuntu_linux:libgdbm-ruby1.9, p-cpe:/a:canonical:ubuntu_linux:ri1.9, p-cpe:/a:canonical:ubuntu_linux:libreadline-ruby1.8, cpe:/o:canonical:ubuntu_linux:9.04, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-elisp, p-cpe:/a:canonical:ubuntu_linux:libdbm-ruby1.9, p-cpe:/a:canonical:ubuntu_linux:libopenssl-ruby1.8, cpe:/o:canonical:ubuntu_linux:6.06:-:lts, p-cpe:/a:canonical:ubuntu_linux:ruby1.9-elisp, p-cpe:/a:canonical:ubuntu_linux:libdbm-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-dev, cpe:/o:canonical:ubuntu_linux:8.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:ruby1.8-examples, p-cpe:/a:canonical:ubuntu_linux:libopenssl-ruby1.9, p-cpe:/a:canonical:ubuntu_linux:ruby1.9, p-cpe:/a:canonical:ubuntu_linux:irb1.8, p-cpe:/a:canonical:ubuntu_linux:rdoc1.8, p-cpe:/a:canonical:ubuntu_linux:libruby1.8-dbg, p-cpe:/a:canonical:ubuntu_linux:ruby1.9-examples, p-cpe:/a:canonical:ubuntu_linux:ri1.8, p-cpe:/a:canonical:ubuntu_linux:libreadline-ruby1.9, p-cpe:/a:canonical:ubuntu_linux:libgdbm-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libtcltk-ruby1.9, cpe:/o:canonical:ubuntu_linux:8.10, p-cpe:/a:canonical:ubuntu_linux:libruby1.9, p-cpe:/a:canonical:ubuntu_linux:irb1.9, p-cpe:/a:canonical:ubuntu_linux:ruby1.8, p-cpe:/a:canonical:ubuntu_linux:libtcltk-ruby1.8, p-cpe:/a:canonical:ubuntu_linux:rdoc1.9, p-cpe:/a:canonical:ubuntu_linux:libruby1.9-dbg, p-cpe:/a:canonical:ubuntu_linux:libruby1.8
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 7/20/2009
CVE: CVE-2009-0642, CVE-2009-1904
BID: 35278