Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845663
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845664
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845665
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845668
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845670
https://security-tracker.debian.org/tracker/CVE-2016-7777
https://security-tracker.debian.org/tracker/CVE-2016-9379
https://security-tracker.debian.org/tracker/CVE-2016-9380
https://security-tracker.debian.org/tracker/CVE-2016-9382
https://security-tracker.debian.org/tracker/CVE-2016-9383
https://security-tracker.debian.org/tracker/CVE-2016-9385
https://security-tracker.debian.org/tracker/CVE-2016-9386
Severity: High
ID: 95610
File Name: debian_DSA-3729.nasl
Version: 3.15
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 12/8/2016
Updated: 1/11/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.5
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:xen, cpe:/o:debian:debian_linux:8.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 12/7/2016
CVE: CVE-2016-7777, CVE-2016-9379, CVE-2016-9380, CVE-2016-9382, CVE-2016-9383, CVE-2016-9385, CVE-2016-9386
DSA: 3729
IAVB: 2016-B-0149-S