Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) - Nessus

High   Plugin ID: 131014

This page contains detailed information about the Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 131014
Name: Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3)
Filename: ubuntu_USN-4186-3.nasl
Vulnerability Published: 2019-08-16
This Plugin Published: 2019-11-14
Last Modification Time: 2021-11-30
Plugin Version: 1.8
Plugin Type: local
Plugin Family: Ubuntu Local Security Checks
Dependencies: linux_alt_patch_detect.nasl, ssh_get_info.nasl
Required KB Items [?]: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Vulnerability Information


Severity: High
Vulnerability Published: 2019-08-16
Patch Published: 2019-11-13
CVE [?]: CVE-2018-12207, CVE-2019-0154, CVE-2019-0155, CVE-2019-2215, CVE-2019-11135, CVE-2019-15098, CVE-2019-16746, CVE-2019-17052, CVE-2019-17053, CVE-2019-17054, CVE-2019-17055, CVE-2019-17056, CVE-2019-17666
CPE [?]: cpe:/o:canonical:ubuntu_linux:16.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual
Exploited by Malware: True

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. This update addresses the issue.

We apologize for the inconvenience.

Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135)

It was discovered that the Intel i915 graphics chipsets allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and expose kernel memory information. A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2019-0155)

Deepak Gupta discovered that on certain Intel processors, the Linux kernel did not properly perform invalidation on page table updates by virtual guest operating systems. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2018-12207)

It was discovered that the Intel i915 graphics chipsets could cause a system hang when userspace performed a read from GT memory mapped input output (MMIO) when the product is in certain low power states. A local attacker could use this to cause a denial of service. (CVE-2019-0154)

Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver for the Linux kernel did not properly validate endpoint descriptors returned by the device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15098)

It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)

Ori Nimron discovered that the AX25 network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17052)

Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17053)

Ori Nimron discovered that the Appletalk network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17054)

Ori Nimron discovered that the modular ISDN network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17055)

Ori Nimron discovered that the Near field Communication (NFC) network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17056)

Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi driver for the Linux kernel when handling Notice of Absence frames. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-17666)

Maddie Stone discovered that the Binder IPC Driver implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-2215).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

Public Exploits


Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework, Exploit-DB, GitHub)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) vulnerability:

  1. Metasploit: exploit/android/local/binder_uaf
    [Android Binder Use-After-Free Exploit]
  2. Exploit-DB: exploits/android/local/47463.txt
    [EDB-47463: Android - Binder Driver Use-After-Free]
  3. Exploit-DB: exploits/android/local/48129.rb
    [EDB-48129: Android Binder - Use-After-Free (Metasploit)]
  4. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2018-12207]
  5. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2018-12207]
  6. GitHub: https://github.com/Al1ex/LinuxEelvation
    [CVE-2019-2215]
  7. GitHub: https://github.com/CrackerCat/cve2019-2215-3.18
    [CVE-2019-2215: cve2019-2215 poc for 3.18 kernel]
  8. GitHub: https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
    [CVE-2019-2215]
  9. GitHub: https://github.com/HacTF/poc--exp
    [CVE-2019-2215]
  10. GitHub: https://github.com/Karma2424/cve2019-2215-3.18
    [CVE-2019-2215]
  11. GitHub: https://github.com/Panopticon-Project/panopticon-Donot
    [CVE-2019-2215]
  12. GitHub: https://github.com/Panopticon-Project/panopticon-Sidewinder
    [CVE-2019-2215]
  13. GitHub: https://github.com/aguerriero1998/Umass-CS-590J-Capstone-Project
    [CVE-2019-2215]
  14. GitHub: https://github.com/c3r34lk1ll3r/CVE-2019-2215
    [CVE-2019-2215: PoC for old Binder vulnerability (based on P0 exploit)]
  15. GitHub: https://github.com/frankzappasmustache/starred-repos
    [CVE-2019-2215]
  16. GitHub: https://github.com/grant-h/qu1ckr00t
    [CVE-2019-2215]
  17. GitHub: https://github.com/mufidmb38/CVE-2019-2215
    [CVE-2019-2215]
  18. GitHub: https://github.com/pengusec/awesome-netsec-articles
    [CVE-2019-2215]
  19. GitHub: https://github.com/raystyle/CVE-2019-2215
    [CVE-2019-2215]
  20. GitHub: https://github.com/tdcoming/Vulnerability-engine
    [CVE-2019-2215]
  21. GitHub: https://github.com/timwr/CVE-2019-2215
    [CVE-2019-2215]
  22. GitHub: https://github.com/wateroot/poc-exp
    [CVE-2019-2215]
  23. GitHub: https://github.com/wrlu/Vulnerabilities
    [CVE-2019-2215]
  24. GitHub: https://github.com/xairy/linux-kernel-exploitation
    [CVE-2019-2215]
  25. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2019-11135]
  26. GitHub: https://github.com/savchenko/windows10
    [CVE-2019-11135]
  27. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2019-11135]
  28. GitHub: https://github.com/offensive-security/exploitdb-bin-sploits/blob/master/bin-sploits/47463.zip
    [EDB-47463]
  29. GitHub: https://github.com/Byte-Master-101/CVE-2019-2215
    [CVE-2019-2215: Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215]
  30. GitHub: https://github.com/DimitriFourny/cve-2019-2215
    [CVE-2019-2215: Android privilege escalation via an use-after-free in binder.c]
  31. GitHub: https://github.com/enceka/cve-2019-2215-3.18
    [CVE-2019-2215: For kernel 3.18.x]
  32. GitHub: https://github.com/kangtastic/cve-2019-2215
    [CVE-2019-2215: Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215]
  33. GitHub: https://github.com/LIznzn/CVE-2019-2215
    [CVE-2019-2215: Temproot for Bravia TV via CVE-2019-2215.]
  34. GitHub: https://github.com/marcinguy/CVE-2019-2215
    [CVE-2019-2215: CVE 2019-2215 Android Binder Use After Free]
  35. GitHub: https://github.com/nicchongwb/Rootsmart-v2.0
    [CVE-2019-2215: Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root ...]
  36. GitHub: https://github.com/sharif-dev/AndroidKernelVulnerability
    [CVE-2019-2215: Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215]
  37. GitHub: https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215
    [CVE-2019-2215: Android-kernel-exploitation-ashfaq-CVE-2019-2215 docker setup for mac users]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS Score Source [?]: CVE-2019-17666
CVSS V2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C
CVSS Base Score:8.3 (High)
Impact Subscore:10.0
Exploitability Subscore:6.5
CVSS Temporal Score:7.2 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.2 (High)
CVSS V3 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CVSS Base Score:8.8 (High)
Impact Subscore:5.9
Exploitability Subscore:2.8
CVSS Temporal Score:8.4 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:8.4 (High)

Go back to menu.

Plugin Source


This is the ubuntu_USN-4186-3.nasl nessus plugin source code. Ubuntu Security Notice (C) 2019-2021 Canonical, Inc. / NASL script (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-4186-3. The text 
# itself is copyright (C) Canonical, Inc. See 
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
# trademark of Canonical, Inc.
#

include("compat.inc");

if (description)
{
  script_id(131014);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/11/30");

  script_cve_id("CVE-2018-12207", "CVE-2019-0154", "CVE-2019-0155", "CVE-2019-11135", "CVE-2019-15098", "CVE-2019-16746", "CVE-2019-17052", "CVE-2019-17053", "CVE-2019-17054", "CVE-2019-17055", "CVE-2019-17056", "CVE-2019-17666", "CVE-2019-2215");
  script_xref(name:"USN", value:"4186-3");
  script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/05/03");

  script_name(english:"Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3)");
  script_summary(english:"Checks dpkg output for updated packages.");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote Ubuntu host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description",
    value:
"USN-4186-1 fixed vulnerabilities in the Linux kernel. It was
discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter
Command Streamer check) was incomplete on 64-bit Intel x86 systems.
This update addresses the issue.

We apologize for the inconvenience.

Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro
Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi
Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van
Bulck discovered that Intel processors using Transactional
Synchronization Extensions (TSX) could expose memory contents
previously stored in microarchitectural buffers to a malicious process
that is executing on the same CPU core. A local attacker could use
this to expose sensitive information. (CVE-2019-11135)

It was discovered that the Intel i915 graphics chipsets allowed
userspace to modify page table entries via writes to MMIO from the
Blitter Command Streamer and expose kernel memory information. A local
attacker could use this to expose sensitive information or possibly
elevate privileges. (CVE-2019-0155)

Deepak Gupta discovered that on certain Intel processors, the Linux
kernel did not properly perform invalidation on page table updates by
virtual guest operating systems. A local attacker in a guest VM could
use this to cause a denial of service (host system crash).
(CVE-2018-12207)

It was discovered that the Intel i915 graphics chipsets could cause a
system hang when userspace performed a read from GT memory mapped
input output (MMIO) when the product is in certain low power states. A
local attacker could use this to cause a denial of service.
(CVE-2019-0154)

Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver
for the Linux kernel did not properly validate endpoint descriptors
returned by the device. A physically proximate attacker could use this
to cause a denial of service (system crash). (CVE-2019-15098)

It was discovered that a buffer overflow existed in the 802.11 Wi-Fi
configuration interface for the Linux kernel when handling beacon
settings. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-16746)

Ori Nimron discovered that the AX25 network protocol implementation in
the Linux kernel did not properly perform permissions checks. A local
attacker could use this to create a raw socket. (CVE-2019-17052)

Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network
protocol implementation in the Linux kernel did not properly perform
permissions checks. A local attacker could use this to create a raw
socket. (CVE-2019-17053)

Ori Nimron discovered that the Appletalk network protocol
implementation in the Linux kernel did not properly perform
permissions checks. A local attacker could use this to create a raw
socket. (CVE-2019-17054)

Ori Nimron discovered that the modular ISDN network protocol
implementation in the Linux kernel did not properly perform
permissions checks. A local attacker could use this to create a raw
socket. (CVE-2019-17055)

Ori Nimron discovered that the Near field Communication (NFC) network
protocol implementation in the Linux kernel did not properly perform
permissions checks. A local attacker could use this to create a raw
socket. (CVE-2019-17056)

Nico Waisman discovered that a buffer overflow existed in the Realtek
Wi-Fi driver for the Linux kernel when handling Notice of Absence
frames. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2019-17666)

Maddie Stone discovered that the Binder IPC Driver implementation in
the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2019-2215).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://usn.ubuntu.com/4186-3/"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-17666");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Android Binder Use-After-Free Exploit');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/11/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/14");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"Ubuntu Security Notice (C) 2019-2021 Canonical, Inc. / NASL script (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Ubuntu Local Security Checks");

  script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
  script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("ubuntu.inc");
include("ksplice.inc");

if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Ubuntu/release");
if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
release = chomp(release);
if (! preg(pattern:"^(16\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04", "Ubuntu " + release);
if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);

if (get_one_kb_item("Host/ksplice/kernel-cves"))
{
  rm_kb_item(name:"Host/uptrack-uname-r");
  cve_list = make_list("CVE-2018-12207", "CVE-2019-0154", "CVE-2019-0155", "CVE-2019-11135", "CVE-2019-15098", "CVE-2019-16746", "CVE-2019-17052", "CVE-2019-17053", "CVE-2019-17054", "CVE-2019-17055", "CVE-2019-17056", "CVE-2019-17666", "CVE-2019-2215");
  if (ksplice_cves_check(cve_list))
  {
    audit(AUDIT_PATCH_INSTALLED, "KSplice hotfix for USN-4186-3");
  }
  else
  {
    _ubuntu_report = ksplice_reporting_text();
  }
}

flag = 0;

if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.4.0-169-generic", pkgver:"4.4.0-169.198")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.4.0-169-generic-lpae", pkgver:"4.4.0-169.198")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.4.0-169-lowlatency", pkgver:"4.4.0-169.198")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-generic", pkgver:"4.4.0.169.177")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-generic-lpae", pkgver:"4.4.0.169.177")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-lowlatency", pkgver:"4.4.0.169.177")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-virtual", pkgver:"4.4.0.169.177")) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : ubuntu_report_get()
  );
  exit(0);
}
else
{
  tested = ubuntu_pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "linux-image-4.4-generic / linux-image-4.4-generic-lpae / etc");
}

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/ubuntu_USN-4186-3.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\ubuntu_USN-4186-3.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/ubuntu_USN-4186-3.nasl

Go back to menu.

How to Run


Here is how to run the Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Ubuntu Local Security Checks plugin family.
  6. On the right side table select Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) plugin ID 131014.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl ubuntu_USN-4186-3.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a ubuntu_USN-4186-3.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - ubuntu_USN-4186-3.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state ubuntu_USN-4186-3.nasl -t <IP/HOST>

Go back to menu.

References


USN | Ubuntu Security Notice: See also: Similar and related Nessus plugins:
  • 130978 - CentOS 6 : kernel (CESA-2019:3836)
  • 130979 - Debian DLA-1990-1 : linux-4.9 security update
  • 130982 - Debian DSA-4564-1 : linux - security update
  • 130983 - Debian DSA-4565-1 : intel-microcode - security update
  • 130989 - Fedora 29 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-7a3fc17778)
  • 130993 - Oracle Linux 6 : kernel (ELSA-2019-3836)
  • 130994 - Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4836)
  • 130995 - Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837)
  • 130996 - Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4838)
  • 130997 - Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4839)
  • 130998 - RHEL 6 : MRG (RHSA-2019:3844)
  • 130999 - RHEL 7 : Virtualization Manager (RHSA-2019:3860)
  • 131006 - Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20191113)
  • 131007 - Scientific Linux Security Update : kernel on SL7.x x86_64 (20191113)
  • 131011 - Ubuntu 19.10 : Linux kernel vulnerability (USN-4183-2)
  • 131012 - Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerability and regression (USN-4184-2)
  • 131013 - Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerability and regression (USN-4185-3)
  • 131018 - VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution Vulnerabilities
  • 131032 - CentOS 7 : kernel (CESA-2019:3834)
  • 131057 - openSUSE Security Update : the Linux Kernel (openSUSE-2019-2503)
  • 131058 - openSUSE Security Update : ucode-intel (openSUSE-2019-2504)
  • 131059 - openSUSE Security Update : qemu (openSUSE-2019-2505)
  • 131060 - openSUSE Security Update : xen (openSUSE-2019-2506)
  • 131061 - openSUSE Security Update : the Linux Kernel (openSUSE-2019-2507)
  • 131062 - openSUSE Security Update : xen (openSUSE-2019-2508)
  • 131063 - openSUSE Security Update : ucode-intel (openSUSE-2019-2509)
  • 131064 - openSUSE Security Update : qemu (openSUSE-2019-2510)
  • 131082 - Amazon Linux 2 : microcode_ctl / kernel (ALAS-2019-1364)
  • 131083 - Amazon Linux AMI : microcode_ctl / kernel (ALAS-2019-1318)
  • 131110 - Oracle Linux 7 : kernel (ELSA-2019-3834)
  • 131114 - Slackware 14.2 : Slackware 14.2 kernel (SSA:2019-320-01)
  • 131120 - SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1)
  • 131121 - SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2986-1)
  • 131122 - SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2987-1)

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file ubuntu_USN-4186-3.nasl version 1.8. For more plugins, visit the Nessus Plugin Library.

Go back to menu.