Language:
https://bugzilla.suse.com/show_bug.cgi?id=1048457
https://bugzilla.suse.com/show_bug.cgi?id=1049796
https://bugzilla.suse.com/show_bug.cgi?id=1050116
https://bugzilla.suse.com/show_bug.cgi?id=1050139
https://bugzilla.suse.com/show_bug.cgi?id=1050632
https://bugzilla.suse.com/show_bug.cgi?id=1051441
https://bugzilla.suse.com/show_bug.cgi?id=1051847
https://bugzilla.suse.com/show_bug.cgi?id=1052450
https://bugzilla.suse.com/show_bug.cgi?id=1052553
https://bugzilla.suse.com/show_bug.cgi?id=1052689
https://bugzilla.suse.com/show_bug.cgi?id=1052758
https://bugzilla.suse.com/show_bug.cgi?id=1052764
https://bugzilla.suse.com/show_bug.cgi?id=1054757
https://bugzilla.suse.com/show_bug.cgi?id=1055214
https://bugzilla.suse.com/show_bug.cgi?id=1056432
https://bugzilla.suse.com/show_bug.cgi?id=1057719
https://bugzilla.suse.com/show_bug.cgi?id=1057729
https://bugzilla.suse.com/show_bug.cgi?id=1057730
https://bugzilla.suse.com/show_bug.cgi?id=1058485
https://bugzilla.suse.com/show_bug.cgi?id=1058637
https://bugzilla.suse.com/show_bug.cgi?id=1059666
https://bugzilla.suse.com/show_bug.cgi?id=1059778
https://bugzilla.suse.com/show_bug.cgi?id=1060577
https://bugzilla.suse.com/show_bug.cgi?id=1066003
https://bugzilla.suse.com/show_bug.cgi?id=1067181
https://bugzilla.suse.com/show_bug.cgi?id=1067184
https://www.suse.com/security/cve/CVE-2017-11188/
https://www.suse.com/security/cve/CVE-2017-11478/
https://www.suse.com/security/cve/CVE-2017-11527/
https://www.suse.com/security/cve/CVE-2017-11535/
https://www.suse.com/security/cve/CVE-2017-11640/
https://www.suse.com/security/cve/CVE-2017-11752/
https://www.suse.com/security/cve/CVE-2017-12140/
https://www.suse.com/security/cve/CVE-2017-12435/
https://www.suse.com/security/cve/CVE-2017-12587/
https://www.suse.com/security/cve/CVE-2017-12644/
https://www.suse.com/security/cve/CVE-2017-12662/
https://www.suse.com/security/cve/CVE-2017-12669/
https://www.suse.com/security/cve/CVE-2017-12983/
https://www.suse.com/security/cve/CVE-2017-13134/
https://www.suse.com/security/cve/CVE-2017-13769/
https://www.suse.com/security/cve/CVE-2017-14172/
https://www.suse.com/security/cve/CVE-2017-14173/
https://www.suse.com/security/cve/CVE-2017-14175/
https://www.suse.com/security/cve/CVE-2017-14341/
https://www.suse.com/security/cve/CVE-2017-14342/
https://www.suse.com/security/cve/CVE-2017-14531/
https://www.suse.com/security/cve/CVE-2017-14607/
https://www.suse.com/security/cve/CVE-2017-14733/
https://www.suse.com/security/cve/CVE-2017-15930/
https://www.suse.com/security/cve/CVE-2017-16545/
Severity: High
ID: 105408
File Name: suse_SU-2017-3378-1.nasl
Version: 3.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/21/2017
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:libmagickcore1
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/20/2017
Vulnerability Publication Date: 7/12/2017
CVE: CVE-2017-11188, CVE-2017-11478, CVE-2017-11527, CVE-2017-11535, CVE-2017-11640, CVE-2017-11752, CVE-2017-12140, CVE-2017-12435, CVE-2017-12587, CVE-2017-12644, CVE-2017-12662, CVE-2017-12669, CVE-2017-12983, CVE-2017-13134, CVE-2017-13769, CVE-2017-14172, CVE-2017-14173, CVE-2017-14175, CVE-2017-14341, CVE-2017-14342, CVE-2017-14531, CVE-2017-14607, CVE-2017-14733, CVE-2017-15930, CVE-2017-16545, CVE-2017-16546