Language:
https://www.suse.com/security/cve/CVE-2016-2197/
https://www.suse.com/security/cve/CVE-2016-2198/
https://www.suse.com/security/cve/CVE-2016-2538/
https://www.suse.com/security/cve/CVE-2016-2841/
https://www.suse.com/security/cve/CVE-2016-2857/
https://www.suse.com/security/cve/CVE-2016-2858/
https://www.suse.com/security/cve/CVE-2016-3710/
https://www.suse.com/security/cve/CVE-2016-3712/
https://www.suse.com/security/cve/CVE-2016-4001/
https://www.suse.com/security/cve/CVE-2016-4002/
https://www.suse.com/security/cve/CVE-2016-4020/
https://www.suse.com/security/cve/CVE-2016-4037/
https://www.suse.com/security/cve/CVE-2016-4439/
https://www.suse.com/security/cve/CVE-2016-4441/
https://www.suse.com/security/cve/CVE-2016-4952/
http://www.nessus.org/u?0f03d2ce
https://bugzilla.suse.com/show_bug.cgi?id=886378
https://bugzilla.suse.com/show_bug.cgi?id=940929
https://bugzilla.suse.com/show_bug.cgi?id=958491
https://bugzilla.suse.com/show_bug.cgi?id=958917
https://bugzilla.suse.com/show_bug.cgi?id=959005
https://bugzilla.suse.com/show_bug.cgi?id=959386
https://bugzilla.suse.com/show_bug.cgi?id=960334
https://bugzilla.suse.com/show_bug.cgi?id=960708
https://bugzilla.suse.com/show_bug.cgi?id=960725
https://bugzilla.suse.com/show_bug.cgi?id=960835
https://bugzilla.suse.com/show_bug.cgi?id=961332
https://bugzilla.suse.com/show_bug.cgi?id=961333
https://bugzilla.suse.com/show_bug.cgi?id=961358
https://bugzilla.suse.com/show_bug.cgi?id=961556
https://bugzilla.suse.com/show_bug.cgi?id=961691
https://bugzilla.suse.com/show_bug.cgi?id=962320
https://bugzilla.suse.com/show_bug.cgi?id=963782
https://bugzilla.suse.com/show_bug.cgi?id=964411
https://bugzilla.suse.com/show_bug.cgi?id=964413
https://bugzilla.suse.com/show_bug.cgi?id=967969
https://bugzilla.suse.com/show_bug.cgi?id=969121
https://bugzilla.suse.com/show_bug.cgi?id=969122
https://bugzilla.suse.com/show_bug.cgi?id=969350
https://bugzilla.suse.com/show_bug.cgi?id=970036
https://bugzilla.suse.com/show_bug.cgi?id=970037
https://bugzilla.suse.com/show_bug.cgi?id=975128
https://bugzilla.suse.com/show_bug.cgi?id=975136
https://bugzilla.suse.com/show_bug.cgi?id=975700
https://bugzilla.suse.com/show_bug.cgi?id=976109
https://bugzilla.suse.com/show_bug.cgi?id=978158
https://bugzilla.suse.com/show_bug.cgi?id=978160
https://bugzilla.suse.com/show_bug.cgi?id=980711
https://bugzilla.suse.com/show_bug.cgi?id=980723
https://bugzilla.suse.com/show_bug.cgi?id=981266
https://www.suse.com/security/cve/CVE-2015-5745/
https://www.suse.com/security/cve/CVE-2015-7549/
https://www.suse.com/security/cve/CVE-2015-8504/
https://www.suse.com/security/cve/CVE-2015-8558/
https://www.suse.com/security/cve/CVE-2015-8567/
https://www.suse.com/security/cve/CVE-2015-8568/
https://www.suse.com/security/cve/CVE-2015-8613/
https://www.suse.com/security/cve/CVE-2015-8619/
https://www.suse.com/security/cve/CVE-2015-8743/
https://www.suse.com/security/cve/CVE-2015-8744/
https://www.suse.com/security/cve/CVE-2015-8745/
https://www.suse.com/security/cve/CVE-2015-8817/
https://www.suse.com/security/cve/CVE-2015-8818/
https://www.suse.com/security/cve/CVE-2016-1568/
https://www.suse.com/security/cve/CVE-2016-1714/
Severity: Critical
ID: 93170
File Name: suse_SU-2016-1703-1.nasl
Version: 2.12
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 8/29/2016
Updated: 1/6/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.3
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9
Temporal Score: 7.8
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:qemu-x86, p-cpe:/a:novell:suse_linux:qemu, p-cpe:/a:novell:suse_linux:qemu-block-curl, p-cpe:/a:novell:suse_linux:qemu-debugsource, p-cpe:/a:novell:suse_linux:qemu-s390-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-curl-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools-debuginfo, p-cpe:/a:novell:suse_linux:qemu-lang, p-cpe:/a:novell:suse_linux:qemu-block-rbd-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-rbd, p-cpe:/a:novell:suse_linux:qemu-kvm, p-cpe:/a:novell:suse_linux:qemu-guest-agent-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools, p-cpe:/a:novell:suse_linux:qemu-guest-agent, p-cpe:/a:novell:suse_linux:qemu-s390
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 6/28/2016
Vulnerability Publication Date: 4/7/2016
CVE: CVE-2015-5745, CVE-2015-7549, CVE-2015-8504, CVE-2015-8558, CVE-2015-8567, CVE-2015-8568, CVE-2015-8613, CVE-2015-8619, CVE-2015-8743, CVE-2015-8744, CVE-2015-8745, CVE-2015-8817, CVE-2015-8818, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922, CVE-2016-1981, CVE-2016-2197, CVE-2016-2198, CVE-2016-2538, CVE-2016-2841, CVE-2016-2857, CVE-2016-2858, CVE-2016-3710, CVE-2016-3712, CVE-2016-4001, CVE-2016-4002, CVE-2016-4020, CVE-2016-4037, CVE-2016-4439, CVE-2016-4441, CVE-2016-4952