http://www.nessus.org/u?e578643e
http://www.nessus.org/u?cd11e0cb
http://www.nessus.org/u?e707a1cc
http://www.nessus.org/u?86d107a6
http://www.nessus.org/u?f038b32a
http://www.nessus.org/u?dd0aec87
http://www.nessus.org/u?4f9dbb7a
http://www.nessus.org/u?781faab0
http://www.nessus.org/u?52bacd0d
http://www.nessus.org/u?71f27850
http://www.nessus.org/u?bb20b394
http://www.nessus.org/u?40fa02cb
http://www.nessus.org/u?e46f64d8
http://www.nessus.org/u?67df0f88
http://www.nessus.org/u?ff3f6632
http://rhn.redhat.com/errata/RHSA-2016-1847.html
http://rhn.redhat.com/errata/RHSA-2016-1875.html
http://rhn.redhat.com/errata/RHSA-2016-1883.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3
http://www.openwall.com/lists/oss-security/2016/06/24/5
http://www.openwall.com/lists/oss-security/2016/09/29/10
http://www.nessus.org/u?4763b451
http://www.nessus.org/u?c85df308
http://www.nessus.org/u?cb8b72e0
http://www.securityfocus.com/bid/91451
http://www.securitytracker.com/id/1036171
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
https://bugzilla.redhat.com/show_bug.cgi?id=1349722
http://www.nessus.org/u?51549e3a
http://www.nessus.org/u?11511d87
http://www.nessus.org/u?6cf219f0
https://security-tracker.debian.org/tracker/CVE-2016-4997
Severity: High
ID: 287804
File Name: unity_linux_UTSA-2026-002583.nasl
Version: 1.2
Type: local
Published: 1/15/2026
Updated: 1/16/2026
Supported Sensors: Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-4997
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/15/2026
Vulnerability Publication Date: 6/24/2016
CVE: CVE-2016-4997