Ubuntu 12.10 : linux vulnerability (USN-1744-1)

Medium Nessus Plugin ID 64810


The remote Ubuntu host is missing one or more security-related patches.


Suleiman Souhlal, Salman Qazi, Aaron Durbin and Michael Davidson discovered a race condition in the Linux kernel's ptrace syscall. An unprivileged local attacker could exploit this flaw to run programs as an administrator.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected linux-image-3.5-generic and / or linux-image-3.5-highbank packages.

Plugin Details

Severity: Medium

ID: 64810

File Name: ubuntu_USN-1744-1.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2013/02/22

Modified: 2016/10/26

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-3.5-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.5-highbank, cpe:/o:canonical:ubuntu_linux:12.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/02/21

Exploitable With


Reference Information

CVE: CVE-2013-0871

USN: 1744-1