Language:
https://bugzilla.suse.com/show_bug.cgi?id=1020427
https://bugzilla.suse.com/show_bug.cgi?id=994605
https://www.suse.com/security/cve/CVE-2016-6834/
https://www.suse.com/security/cve/CVE-2016-6835/
https://www.suse.com/security/cve/CVE-2016-9602/
https://www.suse.com/security/cve/CVE-2016-9603/
https://www.suse.com/security/cve/CVE-2017-10664/
https://www.suse.com/security/cve/CVE-2017-10806/
https://www.suse.com/security/cve/CVE-2017-11334/
https://www.suse.com/security/cve/CVE-2017-11434/
https://www.suse.com/security/cve/CVE-2017-13672/
https://www.suse.com/security/cve/CVE-2017-14167/
https://www.suse.com/security/cve/CVE-2017-15038/
https://www.suse.com/security/cve/CVE-2017-15289/
https://www.suse.com/security/cve/CVE-2017-2633/
https://www.suse.com/security/cve/CVE-2017-5579/
https://www.suse.com/security/cve/CVE-2017-5973/
https://www.suse.com/security/cve/CVE-2017-5987/
https://www.suse.com/security/cve/CVE-2017-6505/
https://www.suse.com/security/cve/CVE-2017-7377/
https://www.suse.com/security/cve/CVE-2017-7471/
https://www.suse.com/security/cve/CVE-2017-7493/
https://www.suse.com/security/cve/CVE-2017-7718/
https://www.suse.com/security/cve/CVE-2017-7980/
https://www.suse.com/security/cve/CVE-2017-8086/
https://bugzilla.suse.com/show_bug.cgi?id=1021741
https://bugzilla.suse.com/show_bug.cgi?id=1025109
https://bugzilla.suse.com/show_bug.cgi?id=1025311
https://bugzilla.suse.com/show_bug.cgi?id=1026612
https://bugzilla.suse.com/show_bug.cgi?id=1028184
https://bugzilla.suse.com/show_bug.cgi?id=1028656
https://bugzilla.suse.com/show_bug.cgi?id=1030624
https://bugzilla.suse.com/show_bug.cgi?id=1032075
https://bugzilla.suse.com/show_bug.cgi?id=1034866
https://bugzilla.suse.com/show_bug.cgi?id=1034908
https://bugzilla.suse.com/show_bug.cgi?id=1035406
https://bugzilla.suse.com/show_bug.cgi?id=1035950
https://bugzilla.suse.com/show_bug.cgi?id=1036211
https://bugzilla.suse.com/show_bug.cgi?id=1037242
https://bugzilla.suse.com/show_bug.cgi?id=1039495
https://bugzilla.suse.com/show_bug.cgi?id=1042159
https://bugzilla.suse.com/show_bug.cgi?id=1042800
https://bugzilla.suse.com/show_bug.cgi?id=1042801
https://bugzilla.suse.com/show_bug.cgi?id=1043296
https://bugzilla.suse.com/show_bug.cgi?id=1045035
https://bugzilla.suse.com/show_bug.cgi?id=1046636
https://bugzilla.suse.com/show_bug.cgi?id=1047674
https://bugzilla.suse.com/show_bug.cgi?id=1048902
https://bugzilla.suse.com/show_bug.cgi?id=1049381
https://bugzilla.suse.com/show_bug.cgi?id=1056334
https://bugzilla.suse.com/show_bug.cgi?id=1057585
https://bugzilla.suse.com/show_bug.cgi?id=1062069
https://bugzilla.suse.com/show_bug.cgi?id=1063122
https://bugzilla.suse.com/show_bug.cgi?id=994418
https://www.suse.com/security/cve/CVE-2017-8112/
https://www.suse.com/security/cve/CVE-2017-8309/
https://www.suse.com/security/cve/CVE-2017-9330/
https://www.suse.com/security/cve/CVE-2017-9373/
https://www.suse.com/security/cve/CVE-2017-9375/
Severity: Critical
ID: 104495
File Name: suse_SU-2017-2969-1.nasl
Version: 3.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 11/10/2017
Updated: 1/6/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.5
Risk Factor: High
Base Score: 9
Temporal Score: 6.7
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9.9
Temporal Score: 8.6
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:qemu-x86, p-cpe:/a:novell:suse_linux:qemu, p-cpe:/a:novell:suse_linux:qemu-block-curl, p-cpe:/a:novell:suse_linux:qemu-debugsource, p-cpe:/a:novell:suse_linux:qemu-s390-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-curl-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools-debuginfo, p-cpe:/a:novell:suse_linux:qemu-lang, p-cpe:/a:novell:suse_linux:qemu-x86-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-rbd-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-rbd, p-cpe:/a:novell:suse_linux:qemu-kvm, p-cpe:/a:novell:suse_linux:qemu-guest-agent-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools, p-cpe:/a:novell:suse_linux:qemu-guest-agent, p-cpe:/a:novell:suse_linux:qemu-s390
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 11/9/2017
Vulnerability Publication Date: 12/10/2016
CVE: CVE-2016-6834, CVE-2016-6835, CVE-2016-9602, CVE-2016-9603, CVE-2017-10664, CVE-2017-10806, CVE-2017-11334, CVE-2017-11434, CVE-2017-13672, CVE-2017-14167, CVE-2017-15038, CVE-2017-15289, CVE-2017-2633, CVE-2017-5579, CVE-2017-5973, CVE-2017-5987, CVE-2017-6505, CVE-2017-7377, CVE-2017-7471, CVE-2017-7493, CVE-2017-7718, CVE-2017-7980, CVE-2017-8086, CVE-2017-8112, CVE-2017-8309, CVE-2017-9330, CVE-2017-9373, CVE-2017-9375, CVE-2017-9503