Language:
Severity: Medium
ID: 44985
File Name: ubuntu_USN-906-1.nasl
Version: 1.17
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 3/4/2010
Updated: 9/19/2019
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.7
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:canonical:ubuntu_linux:libcupscgi1, p-cpe:/a:canonical:ubuntu_linux:libcupsppdc1-dev, p-cpe:/a:canonical:ubuntu_linux:cupsys, p-cpe:/a:canonical:ubuntu_linux:libcupsdriver1, p-cpe:/a:canonical:ubuntu_linux:cupsys-client, p-cpe:/a:canonical:ubuntu_linux:libcupscgi1-dev, p-cpe:/a:canonical:ubuntu_linux:cups-client, p-cpe:/a:canonical:ubuntu_linux:cupsys-bsd, p-cpe:/a:canonical:ubuntu_linux:cups-dbg, p-cpe:/a:canonical:ubuntu_linux:libcupsmime1, p-cpe:/a:canonical:ubuntu_linux:libcupsys2-dev, cpe:/o:canonical:ubuntu_linux:9.04, cpe:/o:canonical:ubuntu_linux:9.10, p-cpe:/a:canonical:ubuntu_linux:libcupsmime1-dev, p-cpe:/a:canonical:ubuntu_linux:libcups2-dev, p-cpe:/a:canonical:ubuntu_linux:libcupsys2-gnutls10, cpe:/o:canonical:ubuntu_linux:6.06:-:lts, p-cpe:/a:canonical:ubuntu_linux:libcupsppdc1, p-cpe:/a:canonical:ubuntu_linux:libcupsdriver1-dev, cpe:/o:canonical:ubuntu_linux:8.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:cups-ppdc, p-cpe:/a:canonical:ubuntu_linux:libcups2, p-cpe:/a:canonical:ubuntu_linux:cupsddk, p-cpe:/a:canonical:ubuntu_linux:cups, p-cpe:/a:canonical:ubuntu_linux:libcupsimage2, p-cpe:/a:canonical:ubuntu_linux:cups-bsd, p-cpe:/a:canonical:ubuntu_linux:cupsys-dbg, p-cpe:/a:canonical:ubuntu_linux:libcupsys2, p-cpe:/a:canonical:ubuntu_linux:cupsys-common, p-cpe:/a:canonical:ubuntu_linux:cups-common, cpe:/o:canonical:ubuntu_linux:8.10, p-cpe:/a:canonical:ubuntu_linux:libcupsimage2-dev
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/3/2010
Vulnerability Publication Date: 11/19/2009
Core Impact
CVE: CVE-2009-3553, CVE-2010-0302, CVE-2010-0393
BID: 38510