Language:
Severity: High
ID: 145007
File Name: ubuntu_USN-4694-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 1/14/2021
Updated: 1/17/2023
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
Risk Factor: Medium
Score: 6
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.1
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Temporal Vector: E:U/RL:OF/RC:C
CVSS Score Source: CVE-2020-28374
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: E:U/RL:O/RC:C
CPE: cpe:/o:canonical:ubuntu_linux:16.04:-:lts, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.10, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-132-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-132-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-132-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-200-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-200-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-200-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-62-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-62-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-62-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.8.0-38-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.8.0-38-generic-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.8.0-38-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.8.0-38-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-64k-hwe-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-64k-hwe-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-16.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-16.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-16.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-16.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-utopic, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-vivid, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-wily, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-xenial, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-utopic, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-vivid, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-wily, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-xenial, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-16.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-16.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-utopic, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-vivid, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-wily, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-xenial, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1, p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-16.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-16.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-lts-utopic, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-lts-vivid, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-lts-wily, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-lts-xenial
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 1/14/2021
Vulnerability Publication Date: 1/13/2021
CVE: CVE-2020-28374
USN: 4694-1