Language:
Severity: High
ID: 83989
File Name: ubuntu_USN-2626-1.nasl
Version: 2.13
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 6/4/2015
Updated: 8/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2015-1860
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2015-1859
CPE: p-cpe:/a:canonical:ubuntu_linux:libqt4-xml, p-cpe:/a:canonical:ubuntu_linux:qtbase5-dev-tools, p-cpe:/a:canonical:ubuntu_linux:qt4-qmake, p-cpe:/a:canonical:ubuntu_linux:libqt4-core, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-tds, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-gestures, p-cpe:/a:canonical:ubuntu_linux:libqt5opengl5, p-cpe:/a:canonical:ubuntu_linux:libqt5network5, p-cpe:/a:canonical:ubuntu_linux:libqtdbus4, p-cpe:/a:canonical:ubuntu_linux:libqt5widgets5, p-cpe:/a:canonical:ubuntu_linux:libqt4-gui, p-cpe:/a:canonical:ubuntu_linux:libqt4-xmlpatterns, p-cpe:/a:canonical:ubuntu_linux:libqtcore4, p-cpe:/a:canonical:ubuntu_linux:libqt4-test, p-cpe:/a:canonical:ubuntu_linux:libqt5printsupport5, p-cpe:/a:canonical:ubuntu_linux:libqt4-opengl-dev, p-cpe:/a:canonical:ubuntu_linux:qt4-qtconfig, p-cpe:/a:canonical:ubuntu_linux:libqt4-network, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-psql, p-cpe:/a:canonical:ubuntu_linux:libqt4-svg, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql, p-cpe:/a:canonical:ubuntu_linux:qt4-dev-tools, p-cpe:/a:canonical:ubuntu_linux:qt4-demos, p-cpe:/a:canonical:ubuntu_linux:libqt4-scripttools, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-sqlite, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-odbc, p-cpe:/a:canonical:ubuntu_linux:libqt5xml5, p-cpe:/a:canonical:ubuntu_linux:libqt4-designer, p-cpe:/a:canonical:ubuntu_linux:libqt4-webkit, p-cpe:/a:canonical:ubuntu_linux:qt5-default, p-cpe:/a:canonical:ubuntu_linux:qt5-qmake, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:qdbus, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-odbc, p-cpe:/a:canonical:ubuntu_linux:libqt5dbus5, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-shaders, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-mysql, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-sqlite, p-cpe:/a:canonical:ubuntu_linux:libqt4-opengl, p-cpe:/a:canonical:ubuntu_linux:libqt5core5a, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-particles, p-cpe:/a:canonical:ubuntu_linux:qt4-default, p-cpe:/a:canonical:ubuntu_linux:libqt5concurrent5, p-cpe:/a:canonical:ubuntu_linux:qtcore4-l10n, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-mysql, p-cpe:/a:canonical:ubuntu_linux:libqt4-help, p-cpe:/a:canonical:ubuntu_linux:libqt4-script, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5, p-cpe:/a:canonical:ubuntu_linux:libqt4-assistant, p-cpe:/a:canonical:ubuntu_linux:libqt5gui5, p-cpe:/a:canonical:ubuntu_linux:qtbase5-examples, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-folderlistmodel, p-cpe:/a:canonical:ubuntu_linux:libqt4-dev, p-cpe:/a:canonical:ubuntu_linux:qt4-linguist-tools, p-cpe:/a:canonical:ubuntu_linux:qt4-designer, p-cpe:/a:canonical:ubuntu_linux:qt4-qmlviewer, p-cpe:/a:canonical:ubuntu_linux:qtbase5-dev, p-cpe:/a:canonical:ubuntu_linux:libqt4-dbus, p-cpe:/a:canonical:ubuntu_linux:libqt5opengl5-dev, p-cpe:/a:canonical:ubuntu_linux:libqt4-dev-bin, p-cpe:/a:canonical:ubuntu_linux:libqt4-private-dev, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-tds, p-cpe:/a:canonical:ubuntu_linux:libqt4-qt3support, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-psql, p-cpe:/a:canonical:ubuntu_linux:libqt5test5, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative, p-cpe:/a:canonical:ubuntu_linux:qtbase5-private-dev, p-cpe:/a:canonical:ubuntu_linux:libqtgui4
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 6/3/2015
Vulnerability Publication Date: 5/8/2014
CVE: CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859, CVE-2015-1860
BID: 67087, 73029, 74302, 74307, 74309, 74310
USN: 2626-1