Language:
https://security-tracker.debian.org/tracker/CVE-2015-7515
https://security-tracker.debian.org/tracker/CVE-2016-2184
https://security-tracker.debian.org/tracker/CVE-2016-2185
https://security-tracker.debian.org/tracker/CVE-2016-2186
https://security-tracker.debian.org/tracker/CVE-2016-2187
https://security-tracker.debian.org/tracker/CVE-2016-3136
https://security-tracker.debian.org/tracker/CVE-2016-3137
https://security-tracker.debian.org/tracker/CVE-2016-3138
https://security-tracker.debian.org/tracker/CVE-2016-3140
https://security-tracker.debian.org/tracker/CVE-2016-0821
https://security-tracker.debian.org/tracker/CVE-2016-1237
https://security-tracker.debian.org/tracker/CVE-2016-1583
https://security-tracker.debian.org/tracker/CVE-2016-2117
https://security-tracker.debian.org/tracker/CVE-2016-2143
https://security-tracker.debian.org/tracker/CVE-2016-3070
https://security-tracker.debian.org/tracker/CVE-2016-3134
https://security-tracker.debian.org/tracker/CVE-2016-3156
https://security-tracker.debian.org/tracker/CVE-2016-3157
https://security-tracker.debian.org/tracker/CVE-2016-3672
https://security-tracker.debian.org/tracker/CVE-2016-3951
https://security-tracker.debian.org/tracker/CVE-2016-3955
https://security-tracker.debian.org/tracker/CVE-2016-3961
https://security-tracker.debian.org/tracker/CVE-2016-4470
https://security-tracker.debian.org/tracker/CVE-2016-4482
https://security-tracker.debian.org/tracker/CVE-2016-4485
https://security-tracker.debian.org/tracker/CVE-2016-4486
https://security-tracker.debian.org/tracker/CVE-2016-4569
https://security-tracker.debian.org/tracker/CVE-2016-4578
https://security-tracker.debian.org/tracker/CVE-2016-4580
https://security-tracker.debian.org/tracker/CVE-2016-5243
https://security-tracker.debian.org/tracker/CVE-2016-5244
https://security-tracker.debian.org/tracker/CVE-2016-4565
https://security-tracker.debian.org/tracker/CVE-2016-4581
https://security-tracker.debian.org/tracker/CVE-2016-4805
https://security-tracker.debian.org/tracker/CVE-2016-4913
https://security-tracker.debian.org/tracker/CVE-2016-4997
https://security-tracker.debian.org/tracker/CVE-2016-4998
深刻度: Critical
ID: 91886
ファイル名: debian_DSA-3607.nasl
バージョン: 2.12
タイプ: local
エージェント: unix
ファミリー: Debian Local Security Checks
公開日: 2016/6/29
更新日: 2021/1/11
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
リスクファクター: High
スコア: 8.9
リスクファクター: Critical
基本値: 10
現状値: 8.7
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
リスクファクター: Critical
基本値: 9.8
現状値: 9.4
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:8.0
必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2016/6/28
脆弱性公開日: 2016/3/12
Metasploit (Linux Kernel 4.6.3 Netfilter Privilege Escalation)
CVE: CVE-2015-7515, CVE-2016-0821, CVE-2016-1237, CVE-2016-1583, CVE-2016-2117, CVE-2016-2143, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-3070, CVE-2016-3134, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140, CVE-2016-3156, CVE-2016-3157, CVE-2016-3672, CVE-2016-3951, CVE-2016-3955, CVE-2016-3961, CVE-2016-4470, CVE-2016-4482, CVE-2016-4485, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4581, CVE-2016-4805, CVE-2016-4913, CVE-2016-4997, CVE-2016-4998, CVE-2016-5243, CVE-2016-5244
DSA: 3607