Language:
https://bugzilla.suse.com/show_bug.cgi?id=1010470
https://bugzilla.suse.com/show_bug.cgi?id=1039348
https://bugzilla.suse.com/show_bug.cgi?id=1052943
https://bugzilla.suse.com/show_bug.cgi?id=1062568
https://bugzilla.suse.com/show_bug.cgi?id=1062840
https://bugzilla.suse.com/show_bug.cgi?id=1063416
https://bugzilla.suse.com/show_bug.cgi?id=1067118
https://bugzilla.suse.com/show_bug.cgi?id=1072689
https://bugzilla.suse.com/show_bug.cgi?id=1072865
https://bugzilla.suse.com/show_bug.cgi?id=1078669
https://bugzilla.suse.com/show_bug.cgi?id=1078672
https://bugzilla.suse.com/show_bug.cgi?id=1078673
https://bugzilla.suse.com/show_bug.cgi?id=1078674
https://bugzilla.suse.com/show_bug.cgi?id=1080464
https://bugzilla.suse.com/show_bug.cgi?id=1080757
https://bugzilla.suse.com/show_bug.cgi?id=1082424
https://bugzilla.suse.com/show_bug.cgi?id=1083242
https://bugzilla.suse.com/show_bug.cgi?id=1083483
https://bugzilla.suse.com/show_bug.cgi?id=1083494
https://bugzilla.suse.com/show_bug.cgi?id=1084536
https://bugzilla.suse.com/show_bug.cgi?id=1085331
https://bugzilla.suse.com/show_bug.cgi?id=1086162
https://bugzilla.suse.com/show_bug.cgi?id=1087088
https://bugzilla.suse.com/show_bug.cgi?id=1087209
https://bugzilla.suse.com/show_bug.cgi?id=1087260
https://bugzilla.suse.com/show_bug.cgi?id=1087762
https://bugzilla.suse.com/show_bug.cgi?id=1088147
https://bugzilla.suse.com/show_bug.cgi?id=1088260
https://bugzilla.suse.com/show_bug.cgi?id=1089608
https://bugzilla.suse.com/show_bug.cgi?id=1089752
https://bugzilla.suse.com/show_bug.cgi?id=940776
https://www.suse.com/security/cve/CVE-2015-5156/
https://www.suse.com/security/cve/CVE-2016-7915/
https://www.suse.com/security/cve/CVE-2017-0861/
https://www.suse.com/security/cve/CVE-2017-12190/
https://www.suse.com/security/cve/CVE-2017-13166/
https://www.suse.com/security/cve/CVE-2017-16644/
https://www.suse.com/security/cve/CVE-2017-16911/
https://www.suse.com/security/cve/CVE-2017-16912/
https://www.suse.com/security/cve/CVE-2017-16913/
https://www.suse.com/security/cve/CVE-2017-16914/
https://www.suse.com/security/cve/CVE-2017-18203/
https://www.suse.com/security/cve/CVE-2017-18208/
https://www.suse.com/security/cve/CVE-2018-10087/
https://www.suse.com/security/cve/CVE-2018-10124/
https://www.suse.com/security/cve/CVE-2018-1087/
https://www.suse.com/security/cve/CVE-2018-6927/
https://www.suse.com/security/cve/CVE-2018-7566/
https://www.suse.com/security/cve/CVE-2018-7757/
https://www.suse.com/security/cve/CVE-2018-8822/
Severity: High
ID: 109646
File Name: suse_SU-2018-1172-1.nasl
Version: 1.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/9/2018
Updated: 10/11/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2018-8897
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-bigsmp-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-bigsmp, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-pae-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/8/2018
Vulnerability Publication Date: 10/19/2015
Metasploit (Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability)
CVE: CVE-2015-5156, CVE-2016-7915, CVE-2017-0861, CVE-2017-12190, CVE-2017-13166, CVE-2017-16644, CVE-2017-16911, CVE-2017-16912, CVE-2017-16913, CVE-2017-16914, CVE-2017-18203, CVE-2017-18208, CVE-2018-10087, CVE-2018-10124, CVE-2018-1087, CVE-2018-6927, CVE-2018-7566, CVE-2018-7757, CVE-2018-8822, CVE-2018-8897