Language:
Severity: High
ID: 99723
File Name: ubuntu_USN-3269-1.nasl
Version: 3.9
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 4/28/2017
Updated: 9/18/2019
Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.1
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal Vector: E:POC/RL:OF/RC:C
Risk Factor: High
Base Score: 7.7
Temporal Score: 6.9
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Temporal Vector: E:P/RL:O/RC:C
CPE: p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.5, p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7, cpe:/o:canonical:ubuntu_linux:14.04, cpe:/o:canonical:ubuntu_linux:16.04, cpe:/o:canonical:ubuntu_linux:16.10, cpe:/o:canonical:ubuntu_linux:17.04
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/27/2017
Vulnerability Publication Date: 2/12/2017
CVE: CVE-2017-3302, CVE-2017-3305, CVE-2017-3308, CVE-2017-3309, CVE-2017-3329, CVE-2017-3331, CVE-2017-3450, CVE-2017-3453, CVE-2017-3454, CVE-2017-3455, CVE-2017-3456, CVE-2017-3457, CVE-2017-3458, CVE-2017-3459, CVE-2017-3460, CVE-2017-3461, CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3465, CVE-2017-3467, CVE-2017-3468, CVE-2017-3599, CVE-2017-3600
USN: 3269-1