Language:
Severity: High
ID: 140685
File Name: openSUSE-2020-1455.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 9/21/2020
Updated: 2/20/2024
Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.5
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-14339
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:libvirt-daemon, p-cpe:/a:novell:opensuse:libvirt-nss-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core-debuginfo, p-cpe:/a:novell:opensuse:libvirt-admin, p-cpe:/a:novell:opensuse:libvirt-client-32bit-debuginfo, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret, p-cpe:/a:novell:opensuse:libvirt, p-cpe:/a:novell:opensuse:libvirt-bash-completion, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:novell:opensuse:wireshark-plugin-libvirt-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-hooks, p-cpe:/a:novell:opensuse:libvirt-daemon-config-network, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk, p-cpe:/a:novell:opensuse:libvirt-debugsource, p-cpe:/a:novell:opensuse:libvirt-devel-32bit, p-cpe:/a:novell:opensuse:libvirt-libs, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc, p-cpe:/a:novell:opensuse:wireshark-plugin-libvirt, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical, p-cpe:/a:novell:opensuse:libvirt-daemon-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage, p-cpe:/a:novell:opensuse:libvirt-devel, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-gluster-debuginfo, p-cpe:/a:novell:opensuse:libvirt-client, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-gluster, p-cpe:/a:novell:opensuse:libvirt-admin-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock, p-cpe:/a:novell:opensuse:libvirt-libs-debuginfo, p-cpe:/a:novell:opensuse:libvirt-nss, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-xen, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi-debuginfo
Required KB Items: Host/cpu, Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 9/19/2020
Vulnerability Publication Date: 12/3/2020
CVE: CVE-2020-14339