Language:
https://bugzilla.suse.com/show_bug.cgi?id=1010470
https://bugzilla.suse.com/show_bug.cgi?id=1012382
https://bugzilla.suse.com/show_bug.cgi?id=1045330
https://bugzilla.suse.com/show_bug.cgi?id=1055755
https://bugzilla.suse.com/show_bug.cgi?id=1062568
https://bugzilla.suse.com/show_bug.cgi?id=1063416
https://bugzilla.suse.com/show_bug.cgi?id=1066001
https://bugzilla.suse.com/show_bug.cgi?id=1067118
https://bugzilla.suse.com/show_bug.cgi?id=1068032
https://bugzilla.suse.com/show_bug.cgi?id=1072689
https://bugzilla.suse.com/show_bug.cgi?id=1072865
https://bugzilla.suse.com/show_bug.cgi?id=1074488
https://bugzilla.suse.com/show_bug.cgi?id=1075617
https://bugzilla.suse.com/show_bug.cgi?id=1075621
https://bugzilla.suse.com/show_bug.cgi?id=1077182
https://bugzilla.suse.com/show_bug.cgi?id=1077560
https://bugzilla.suse.com/show_bug.cgi?id=1077779
https://bugzilla.suse.com/show_bug.cgi?id=1078669
https://bugzilla.suse.com/show_bug.cgi?id=1078672
https://bugzilla.suse.com/show_bug.cgi?id=1078673
https://bugzilla.suse.com/show_bug.cgi?id=1078674
https://bugzilla.suse.com/show_bug.cgi?id=1080255
https://bugzilla.suse.com/show_bug.cgi?id=1080287
https://bugzilla.suse.com/show_bug.cgi?id=1080464
https://bugzilla.suse.com/show_bug.cgi?id=1080757
https://bugzilla.suse.com/show_bug.cgi?id=1081512
https://bugzilla.suse.com/show_bug.cgi?id=1082299
https://bugzilla.suse.com/show_bug.cgi?id=1083244
https://bugzilla.suse.com/show_bug.cgi?id=1083483
https://bugzilla.suse.com/show_bug.cgi?id=1083494
https://bugzilla.suse.com/show_bug.cgi?id=1083640
https://bugzilla.suse.com/show_bug.cgi?id=1084323
https://bugzilla.suse.com/show_bug.cgi?id=1085107
https://bugzilla.suse.com/show_bug.cgi?id=1085114
https://bugzilla.suse.com/show_bug.cgi?id=1085447
https://www.suse.com/security/cve/CVE-2016-7915/
https://www.suse.com/security/cve/CVE-2017-12190/
https://www.suse.com/security/cve/CVE-2017-13166/
https://www.suse.com/security/cve/CVE-2017-15299/
https://www.suse.com/security/cve/CVE-2017-16644/
https://www.suse.com/security/cve/CVE-2017-16911/
https://www.suse.com/security/cve/CVE-2017-16912/
https://www.suse.com/security/cve/CVE-2017-16913/
https://www.suse.com/security/cve/CVE-2017-16914/
https://www.suse.com/security/cve/CVE-2017-18017/
https://www.suse.com/security/cve/CVE-2017-18204/
https://www.suse.com/security/cve/CVE-2017-18208/
https://www.suse.com/security/cve/CVE-2017-18221/
https://www.suse.com/security/cve/CVE-2018-1066/
https://www.suse.com/security/cve/CVE-2018-1068/
https://www.suse.com/security/cve/CVE-2018-5332/
https://www.suse.com/security/cve/CVE-2018-5333/
https://www.suse.com/security/cve/CVE-2018-6927/
Severity: Critical
ID: 108748
File Name: suse_SU-2018-0848-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/30/2018
Updated: 1/23/2020
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-default, p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-xen, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-xen-debugsource, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 3/29/2018
Vulnerability Publication Date: 11/16/2016
Metasploit (Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation)
CVE: CVE-2016-7915, CVE-2017-12190, CVE-2017-13166, CVE-2017-15299, CVE-2017-16644, CVE-2017-16911, CVE-2017-16912, CVE-2017-16913, CVE-2017-16914, CVE-2017-18017, CVE-2017-18204, CVE-2017-18208, CVE-2017-18221, CVE-2018-1066, CVE-2018-1068, CVE-2018-5332, CVE-2018-5333, CVE-2018-6927, CVE-2018-7566