http://www.nessus.org/u?180f2ad9
http://www.nessus.org/u?5bab7e41
http://linux.oracle.com/errata/ELSA-2014-0924.html
http://linux.oracle.com/errata/ELSA-2014-3047.html
http://linux.oracle.com/errata/ELSA-2014-3048.html
http://openwall.com/lists/oss-security/2014/07/05/4
http://openwall.com/lists/oss-security/2014/07/08/16
http://openwall.com/lists/oss-security/2014/07/08/5
http://www.nessus.org/u?becc63e7
http://secunia.com/advisories/59633
http://secunia.com/advisories/59639
http://secunia.com/advisories/59654
http://secunia.com/advisories/60220
http://secunia.com/advisories/60380
http://secunia.com/advisories/60393
http://www.debian.org/security/2014/dsa-2972
http://www.exploit-db.com/exploits/34134
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4
http://www.openwall.com/lists/oss-security/2014/07/04/4
http://www.ubuntu.com/usn/USN-2266-1
http://www.ubuntu.com/usn/USN-2267-1
http://www.ubuntu.com/usn/USN-2268-1
http://www.ubuntu.com/usn/USN-2269-1
http://www.ubuntu.com/usn/USN-2270-1
http://www.ubuntu.com/usn/USN-2271-1
http://www.ubuntu.com/usn/USN-2272-1
http://www.ubuntu.com/usn/USN-2273-1
http://www.ubuntu.com/usn/USN-2274-1
https://bugzilla.redhat.com/show_bug.cgi?id=1115927
http://www.nessus.org/u?b071166e
https://security-tracker.debian.org/tracker/CVE-2014-4699
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97
Severity: High
ID: 286892
File Name: unity_linux_UTSA-2026-002480.nasl
Version: 1.1
Type: local
Published: 1/15/2026
Updated: 1/15/2026
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.7
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2014-4699
Risk Factor: High
Base Score: 7
Temporal Score: 6.5
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 7/9/2014
CVE: CVE-2014-4699