Language:
Severity: Critical
ID: 127888
File Name: ubuntu_USN-4093-1.nasl
Version: 1.11
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 8/14/2019
Updated: 5/11/2023
Supported Sensors: Frictionless Assessment Azure, Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent
Risk Factor: Critical
Score: 9.7
Risk Factor: High
Base Score: 8.3
Temporal Score: 7.2
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2019-3846
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-snapdragon, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-gke, p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon, p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:19.04
Required KB Items: Host/Debian/dpkg-l, Host/Ubuntu, Host/cpu, Host/Ubuntu/release
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/13/2019
Vulnerability Publication Date: 6/3/2019
CISA Known Exploited Dates: 6/10/2022
Core Impact
Metasploit (Linux Polkit pkexec helper PTRACE_TRACEME local root exploit)
CVE: CVE-2019-10126, CVE-2019-1125, CVE-2019-12614, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-3846
USN: 4093-1