Language:
https://bugzilla.suse.com/show_bug.cgi?id=1012382
https://bugzilla.suse.com/show_bug.cgi?id=1054305
https://bugzilla.suse.com/show_bug.cgi?id=1060279
https://bugzilla.suse.com/show_bug.cgi?id=1068032
https://bugzilla.suse.com/show_bug.cgi?id=1068984
https://bugzilla.suse.com/show_bug.cgi?id=1070781
https://bugzilla.suse.com/show_bug.cgi?id=1073311
https://bugzilla.suse.com/show_bug.cgi?id=1074488
https://bugzilla.suse.com/show_bug.cgi?id=1074621
https://bugzilla.suse.com/show_bug.cgi?id=1075091
https://bugzilla.suse.com/show_bug.cgi?id=1075410
https://bugzilla.suse.com/show_bug.cgi?id=1075617
https://bugzilla.suse.com/show_bug.cgi?id=1075621
https://bugzilla.suse.com/show_bug.cgi?id=1075908
https://bugzilla.suse.com/show_bug.cgi?id=1075994
https://bugzilla.suse.com/show_bug.cgi?id=1076017
https://bugzilla.suse.com/show_bug.cgi?id=1076154
https://bugzilla.suse.com/show_bug.cgi?id=1076278
https://bugzilla.suse.com/show_bug.cgi?id=1076849
https://bugzilla.suse.com/show_bug.cgi?id=1077406
https://bugzilla.suse.com/show_bug.cgi?id=1077560
https://bugzilla.suse.com/show_bug.cgi?id=1077922
https://www.suse.com/security/cve/CVE-2017-13215/
https://www.suse.com/security/cve/CVE-2017-17741/
https://www.suse.com/security/cve/CVE-2017-18017/
https://www.suse.com/security/cve/CVE-2017-18079/
https://www.suse.com/security/cve/CVE-2017-5715/
https://www.suse.com/security/cve/CVE-2018-1000004/
https://www.suse.com/security/cve/CVE-2018-5332/
Severity: Critical
ID: 108279
File Name: suse_SU-2018-0660-1.nasl
Version: 1.10
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/13/2018
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.6
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-bigsmp-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-bigsmp, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-pae-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/12/2018
Vulnerability Publication Date: 12/18/2017
Metasploit (Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation)
CVE: CVE-2017-13215, CVE-2017-17741, CVE-2017-18017, CVE-2017-18079, CVE-2017-5715, CVE-2018-1000004, CVE-2018-5332, CVE-2018-5333
IAVA: 2018-A-0020