Language:
https://bugzilla.suse.com/1188609
https://bugzilla.suse.com/1190011
https://bugzilla.suse.com/1207205
https://bugzilla.suse.com/1212850
https://bugzilla.suse.com/1213414
https://bugzilla.suse.com/1213925
https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html
https://www.suse.com/security/cve/CVE-2021-3638
https://www.suse.com/security/cve/CVE-2021-3750
https://www.suse.com/security/cve/CVE-2023-0330
https://www.suse.com/security/cve/CVE-2023-3180
Severity: High
ID: 180296
File Name: suse_SU-2023-3444-1.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 8/30/2023
Updated: 3/15/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.3
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2021-3750
Risk Factor: High
Base Score: 8.2
Temporal Score: 7.4
Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:qemu-hw-usb-redirect, p-cpe:/a:novell:suse_linux:qemu-block-ssh, p-cpe:/a:novell:suse_linux:qemu-sgabios, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-gpu-pci, p-cpe:/a:novell:suse_linux:qemu-audio-spice, p-cpe:/a:novell:suse_linux:qemu-lang, p-cpe:/a:novell:suse_linux:qemu-audio-alsa, p-cpe:/a:novell:suse_linux:qemu-ppc, p-cpe:/a:novell:suse_linux:qemu-hw-display-qxl, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-vga, p-cpe:/a:novell:suse_linux:qemu-chardev-baum, p-cpe:/a:novell:suse_linux:qemu-slof, p-cpe:/a:novell:suse_linux:qemu-ksm, p-cpe:/a:novell:suse_linux:qemu-block-curl, p-cpe:/a:novell:suse_linux:qemu-ui-spice-core, p-cpe:/a:novell:suse_linux:qemu-chardev-spice, p-cpe:/a:novell:suse_linux:qemu-hw-s390x-virtio-gpu-ccw, p-cpe:/a:novell:suse_linux:qemu-s390x, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-gpu, p-cpe:/a:novell:suse_linux:qemu-kvm, p-cpe:/a:novell:suse_linux:qemu-guest-agent, p-cpe:/a:novell:suse_linux:qemu-seabios, p-cpe:/a:novell:suse_linux:qemu, p-cpe:/a:novell:suse_linux:qemu-ui-curses, p-cpe:/a:novell:suse_linux:qemu-ipxe, p-cpe:/a:novell:suse_linux:qemu-skiboot, p-cpe:/a:novell:suse_linux:qemu-vgabios, p-cpe:/a:novell:suse_linux:qemu-arm, p-cpe:/a:novell:suse_linux:qemu-block-rbd, p-cpe:/a:novell:suse_linux:qemu-audio-pa, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:qemu-x86, p-cpe:/a:novell:suse_linux:qemu-tools, p-cpe:/a:novell:suse_linux:qemu-ui-opengl, p-cpe:/a:novell:suse_linux:qemu-ui-gtk, p-cpe:/a:novell:suse_linux:qemu-ui-spice-app, p-cpe:/a:novell:suse_linux:qemu-block-iscsi
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/28/2023
Vulnerability Publication Date: 3/3/2022
CVE: CVE-2021-3638, CVE-2021-3750, CVE-2023-0330, CVE-2023-3180, CVE-2023-3301, CVE-2023-3354
IAVB: 2023-B-0019-S, 2023-B-0058-S, 2023-B-0073-S
SuSE: SUSE-SU-2023:3444-1