Language:
Severity: High
ID: 83989
File Name: ubuntu_USN-2626-1.nasl
Version: 2.12
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 6/4/2015
Updated: 10/20/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2015-1860
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2015-1859
CPE: p-cpe:/a:canonical:ubuntu_linux:libqt5gui5, p-cpe:/a:canonical:ubuntu_linux:libqt5network5, p-cpe:/a:canonical:ubuntu_linux:libqt5opengl5, p-cpe:/a:canonical:ubuntu_linux:libqt5opengl5-dev, p-cpe:/a:canonical:ubuntu_linux:libqt5printsupport5, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-mysql, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-odbc, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-psql, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-sqlite, p-cpe:/a:canonical:ubuntu_linux:libqt5sql5-tds, p-cpe:/a:canonical:ubuntu_linux:libqt5test5, p-cpe:/a:canonical:ubuntu_linux:libqt5widgets5, p-cpe:/a:canonical:ubuntu_linux:libqt5xml5, p-cpe:/a:canonical:ubuntu_linux:libqtcore4, p-cpe:/a:canonical:ubuntu_linux:libqtdbus4, p-cpe:/a:canonical:ubuntu_linux:libqtgui4, p-cpe:/a:canonical:ubuntu_linux:qdbus, p-cpe:/a:canonical:ubuntu_linux:qt4-default, p-cpe:/a:canonical:ubuntu_linux:qt4-demos, p-cpe:/a:canonical:ubuntu_linux:qt4-designer, p-cpe:/a:canonical:ubuntu_linux:qt4-dev-tools, p-cpe:/a:canonical:ubuntu_linux:qt4-linguist-tools, p-cpe:/a:canonical:ubuntu_linux:qt4-qmake, p-cpe:/a:canonical:ubuntu_linux:qt4-qmlviewer, p-cpe:/a:canonical:ubuntu_linux:qt4-qtconfig, p-cpe:/a:canonical:ubuntu_linux:qt5-default, p-cpe:/a:canonical:ubuntu_linux:qt5-qmake, p-cpe:/a:canonical:ubuntu_linux:qtbase5-dev, p-cpe:/a:canonical:ubuntu_linux:qtbase5-dev-tools, p-cpe:/a:canonical:ubuntu_linux:qtbase5-examples, p-cpe:/a:canonical:ubuntu_linux:qtbase5-private-dev, p-cpe:/a:canonical:ubuntu_linux:qtcore4-l10n, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libqt4-assistant, p-cpe:/a:canonical:ubuntu_linux:libqt4-core, p-cpe:/a:canonical:ubuntu_linux:libqt4-dbus, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-folderlistmodel, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-gestures, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-particles, p-cpe:/a:canonical:ubuntu_linux:libqt4-declarative-shaders, p-cpe:/a:canonical:ubuntu_linux:libqt4-designer, p-cpe:/a:canonical:ubuntu_linux:libqt4-dev, p-cpe:/a:canonical:ubuntu_linux:libqt4-dev-bin, p-cpe:/a:canonical:ubuntu_linux:libqt4-gui, p-cpe:/a:canonical:ubuntu_linux:libqt4-help, p-cpe:/a:canonical:ubuntu_linux:libqt4-network, p-cpe:/a:canonical:ubuntu_linux:libqt4-opengl, p-cpe:/a:canonical:ubuntu_linux:libqt4-opengl-dev, p-cpe:/a:canonical:ubuntu_linux:libqt4-private-dev, p-cpe:/a:canonical:ubuntu_linux:libqt4-qt3support, p-cpe:/a:canonical:ubuntu_linux:libqt4-script, p-cpe:/a:canonical:ubuntu_linux:libqt4-scripttools, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-mysql, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-odbc, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-psql, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-sqlite, p-cpe:/a:canonical:ubuntu_linux:libqt4-sql-tds, p-cpe:/a:canonical:ubuntu_linux:libqt4-svg, p-cpe:/a:canonical:ubuntu_linux:libqt4-test, p-cpe:/a:canonical:ubuntu_linux:libqt4-webkit, p-cpe:/a:canonical:ubuntu_linux:libqt4-xml, p-cpe:/a:canonical:ubuntu_linux:libqt4-xmlpatterns, p-cpe:/a:canonical:ubuntu_linux:libqt5concurrent5, p-cpe:/a:canonical:ubuntu_linux:libqt5core5a, p-cpe:/a:canonical:ubuntu_linux:libqt5dbus5
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Ease: No known exploits are available
Patch Publication Date: 6/3/2015
Vulnerability Publication Date: 5/8/2014
CVE: CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859, CVE-2015-1860
BID: 67087, 73029, 74302, 74307, 74309, 74310
USN: 2626-1