語系:
https://security-tracker.debian.org/tracker/CVE-2015-7515
https://security-tracker.debian.org/tracker/CVE-2016-2184
https://security-tracker.debian.org/tracker/CVE-2016-2185
https://security-tracker.debian.org/tracker/CVE-2016-2186
https://security-tracker.debian.org/tracker/CVE-2016-2187
https://security-tracker.debian.org/tracker/CVE-2016-3136
https://security-tracker.debian.org/tracker/CVE-2016-3137
https://security-tracker.debian.org/tracker/CVE-2016-3138
https://security-tracker.debian.org/tracker/CVE-2016-3140
https://security-tracker.debian.org/tracker/CVE-2016-0821
https://security-tracker.debian.org/tracker/CVE-2016-1237
https://security-tracker.debian.org/tracker/CVE-2016-1583
https://security-tracker.debian.org/tracker/CVE-2016-2117
https://security-tracker.debian.org/tracker/CVE-2016-2143
https://security-tracker.debian.org/tracker/CVE-2016-3070
https://security-tracker.debian.org/tracker/CVE-2016-3134
https://security-tracker.debian.org/tracker/CVE-2016-3156
https://security-tracker.debian.org/tracker/CVE-2016-3157
https://security-tracker.debian.org/tracker/CVE-2016-3672
https://security-tracker.debian.org/tracker/CVE-2016-3951
https://security-tracker.debian.org/tracker/CVE-2016-3955
https://security-tracker.debian.org/tracker/CVE-2016-3961
https://security-tracker.debian.org/tracker/CVE-2016-4470
https://security-tracker.debian.org/tracker/CVE-2016-4482
https://security-tracker.debian.org/tracker/CVE-2016-4485
https://security-tracker.debian.org/tracker/CVE-2016-4486
https://security-tracker.debian.org/tracker/CVE-2016-4569
https://security-tracker.debian.org/tracker/CVE-2016-4578
https://security-tracker.debian.org/tracker/CVE-2016-4580
https://security-tracker.debian.org/tracker/CVE-2016-5243
https://security-tracker.debian.org/tracker/CVE-2016-5244
https://security-tracker.debian.org/tracker/CVE-2016-4565
https://security-tracker.debian.org/tracker/CVE-2016-4581
https://security-tracker.debian.org/tracker/CVE-2016-4805
https://security-tracker.debian.org/tracker/CVE-2016-4913
https://security-tracker.debian.org/tracker/CVE-2016-4997
https://security-tracker.debian.org/tracker/CVE-2016-4998
嚴重性: Critical
ID: 91886
檔案名稱: debian_DSA-3607.nasl
版本: 2.12
類型: local
代理程式: unix
已發布: 2016/6/29
已更新: 2021/1/11
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
風險因素: High
分數: 8.9
風險因素: Critical
基本分數: 10
時間分數: 8.7
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
風險因素: Critical
基本分數: 9.8
時間分數: 9.4
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:8.0
必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2016/6/28
弱點發布日期: 2016/3/12
Metasploit (Linux Kernel 4.6.3 Netfilter Privilege Escalation)
CVE: CVE-2015-7515, CVE-2016-0821, CVE-2016-1237, CVE-2016-1583, CVE-2016-2117, CVE-2016-2143, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-3070, CVE-2016-3134, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140, CVE-2016-3156, CVE-2016-3157, CVE-2016-3672, CVE-2016-3951, CVE-2016-3955, CVE-2016-3961, CVE-2016-4470, CVE-2016-4482, CVE-2016-4485, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4581, CVE-2016-4805, CVE-2016-4913, CVE-2016-4997, CVE-2016-4998, CVE-2016-5243, CVE-2016-5244
DSA: 3607