Language:
https://bugzilla.opensuse.org/show_bug.cgi?id=1181197
https://bugzilla.opensuse.org/show_bug.cgi?id=1181198
https://bugzilla.opensuse.org/show_bug.cgi?id=1183125
Severity: High
ID: 149536
File Name: openSUSE-2021-630.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/18/2021
Updated: 1/1/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.1
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.8
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2021-2074
Risk Factor: High
Base Score: 8.4
Temporal Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2021-2264
CPE: p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-kmp-default, p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo, p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-debugsource, p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt, p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-source, p-cpe:/a:novell:opensuse:virtualbox-devel, p-cpe:/a:novell:opensuse:virtualbox-kmp-debugsource, p-cpe:/a:novell:opensuse:virtualbox, p-cpe:/a:novell:opensuse:virtualbox-host-source, p-cpe:/a:novell:opensuse:python3-virtualbox, p-cpe:/a:novell:opensuse:virtualbox-guest-tools, p-cpe:/a:novell:opensuse:virtualbox-guest-x11, p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons, p-cpe:/a:novell:opensuse:virtualbox-qt, p-cpe:/a:novell:opensuse:virtualbox-websrv, p-cpe:/a:novell:opensuse:virtualbox-debuginfo, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:virtualbox-vnc, p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/30/2021
Vulnerability Publication Date: 1/20/2021