Language:
https://bugzilla.suse.com/1149813
https://bugzilla.suse.com/1163019
https://bugzilla.suse.com/1175144
https://bugzilla.suse.com/1175534
https://bugzilla.suse.com/1176681
https://bugzilla.suse.com/1178683
https://bugzilla.suse.com/1178935
https://bugzilla.suse.com/1179477
https://bugzilla.suse.com/1179484
https://bugzilla.suse.com/1179686
https://bugzilla.suse.com/1181103
https://bugzilla.suse.com/1182282
https://bugzilla.suse.com/1182425
https://bugzilla.suse.com/1182968
https://bugzilla.suse.com/1182975
https://bugzilla.suse.com/1183373
https://bugzilla.suse.com/1186290
http://www.nessus.org/u?47e6ea4b
https://www.suse.com/security/cve/CVE-2019-15890
https://www.suse.com/security/cve/CVE-2020-14364
https://www.suse.com/security/cve/CVE-2020-17380
https://www.suse.com/security/cve/CVE-2020-25085
https://www.suse.com/security/cve/CVE-2020-25707
https://www.suse.com/security/cve/CVE-2020-25723
https://www.suse.com/security/cve/CVE-2020-27821
https://www.suse.com/security/cve/CVE-2020-29129
https://www.suse.com/security/cve/CVE-2020-29130
https://www.suse.com/security/cve/CVE-2020-8608
https://www.suse.com/security/cve/CVE-2021-20263
https://www.suse.com/security/cve/CVE-2021-3409
Severity: Medium
ID: 151714
File Name: openSUSE-2021-1942.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 7/16/2021
Updated: 12/8/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 4.9
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-8608
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2020-17380
CPE: p-cpe:/a:novell:opensuse:qemu-block-iscsi, p-cpe:/a:novell:opensuse:qemu-seabios, p-cpe:/a:novell:opensuse:qemu-ui-gtk, p-cpe:/a:novell:opensuse:qemu-block-ssh, p-cpe:/a:novell:opensuse:qemu-vgabios, p-cpe:/a:novell:opensuse:qemu-hw-display-virtio-gpu-pci, p-cpe:/a:novell:opensuse:qemu-ui-spice-app, p-cpe:/a:novell:opensuse:qemu-hw-usb-redirect, p-cpe:/a:novell:opensuse:qemu-lang, p-cpe:/a:novell:opensuse:qemu-ui-spice-core, p-cpe:/a:novell:opensuse:qemu-audio-spice, p-cpe:/a:novell:opensuse:qemu-ppc, p-cpe:/a:novell:opensuse:qemu-x86, p-cpe:/a:novell:opensuse:qemu-kvm, p-cpe:/a:novell:opensuse:qemu-sgabios, p-cpe:/a:novell:opensuse:qemu-hw-display-virtio-vga, p-cpe:/a:novell:opensuse:qemu-s390x, p-cpe:/a:novell:opensuse:qemu-chardev-spice, p-cpe:/a:novell:opensuse:qemu-extra, p-cpe:/a:novell:opensuse:qemu-skiboot, p-cpe:/a:novell:opensuse:qemu-audio-alsa, p-cpe:/a:novell:opensuse:qemu-ivshmem-tools, p-cpe:/a:novell:opensuse:qemu-block-curl, p-cpe:/a:novell:opensuse:qemu-block-dmg, p-cpe:/a:novell:opensuse:qemu-block-nfs, p-cpe:/a:novell:opensuse:qemu-hw-usb-smartcard, p-cpe:/a:novell:opensuse:qemu-chardev-baum, p-cpe:/a:novell:opensuse:qemu-block-rbd, p-cpe:/a:novell:opensuse:qemu-ui-curses, p-cpe:/a:novell:opensuse:qemu-hw-s390x-virtio-gpu-ccw, p-cpe:/a:novell:opensuse:qemu-ui-opengl, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:qemu-block-gluster, p-cpe:/a:novell:opensuse:qemu-ipxe, p-cpe:/a:novell:opensuse:qemu-tools, p-cpe:/a:novell:opensuse:qemu-arm, p-cpe:/a:novell:opensuse:qemu-microvm, p-cpe:/a:novell:opensuse:qemu-vhost-user-gpu, p-cpe:/a:novell:opensuse:qemu-ksm, p-cpe:/a:novell:opensuse:qemu-hw-display-virtio-gpu, p-cpe:/a:novell:opensuse:qemu-hw-display-qxl, p-cpe:/a:novell:opensuse:qemu-audio-pa, p-cpe:/a:novell:opensuse:qemu, p-cpe:/a:novell:opensuse:qemu-guest-agent
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/11/2021
Vulnerability Publication Date: 9/6/2019
CVE: CVE-2019-15890, CVE-2020-14364, CVE-2020-17380, CVE-2020-25085, CVE-2020-25707, CVE-2020-25723, CVE-2020-27821, CVE-2020-29129, CVE-2020-29130, CVE-2020-8608, CVE-2021-20263, CVE-2021-3409, CVE-2021-3416, CVE-2021-3419
IAVB: 2020-B-0063-S, 2020-B-0075-S