Language:
https://bugzilla.suse.com/show_bug.cgi?id=839104
https://bugzilla.suse.com/show_bug.cgi?id=866130
https://bugzilla.suse.com/show_bug.cgi?id=919351
https://bugzilla.suse.com/show_bug.cgi?id=944309
https://bugzilla.suse.com/show_bug.cgi?id=950998
https://bugzilla.suse.com/show_bug.cgi?id=960689
https://bugzilla.suse.com/show_bug.cgi?id=962404
https://bugzilla.suse.com/show_bug.cgi?id=963655
https://bugzilla.suse.com/show_bug.cgi?id=963762
https://bugzilla.suse.com/show_bug.cgi?id=966460
https://bugzilla.suse.com/show_bug.cgi?id=969149
https://bugzilla.suse.com/show_bug.cgi?id=970114
https://bugzilla.suse.com/show_bug.cgi?id=971126
https://bugzilla.suse.com/show_bug.cgi?id=971360
https://bugzilla.suse.com/show_bug.cgi?id=971446
https://bugzilla.suse.com/show_bug.cgi?id=971729
https://bugzilla.suse.com/show_bug.cgi?id=971944
https://bugzilla.suse.com/show_bug.cgi?id=974428
https://bugzilla.suse.com/show_bug.cgi?id=975945
https://bugzilla.suse.com/show_bug.cgi?id=978401
https://bugzilla.suse.com/show_bug.cgi?id=978821
https://bugzilla.suse.com/show_bug.cgi?id=978822
https://bugzilla.suse.com/show_bug.cgi?id=979213
https://bugzilla.suse.com/show_bug.cgi?id=979274
https://bugzilla.suse.com/show_bug.cgi?id=979548
https://bugzilla.suse.com/show_bug.cgi?id=979681
https://bugzilla.suse.com/show_bug.cgi?id=979867
https://bugzilla.suse.com/show_bug.cgi?id=979879
https://bugzilla.suse.com/show_bug.cgi?id=980371
https://bugzilla.suse.com/show_bug.cgi?id=980725
https://bugzilla.suse.com/show_bug.cgi?id=980788
https://bugzilla.suse.com/show_bug.cgi?id=980931
https://bugzilla.suse.com/show_bug.cgi?id=981267
https://bugzilla.suse.com/show_bug.cgi?id=983143
https://bugzilla.suse.com/show_bug.cgi?id=983213
https://bugzilla.suse.com/show_bug.cgi?id=983535
https://bugzilla.suse.com/show_bug.cgi?id=984107
https://bugzilla.suse.com/show_bug.cgi?id=984755
https://bugzilla.suse.com/show_bug.cgi?id=986362
https://bugzilla.suse.com/show_bug.cgi?id=986365
https://bugzilla.suse.com/show_bug.cgi?id=986445
https://bugzilla.suse.com/show_bug.cgi?id=986572
https://bugzilla.suse.com/show_bug.cgi?id=987709
https://bugzilla.suse.com/show_bug.cgi?id=988065
https://bugzilla.suse.com/show_bug.cgi?id=989152
https://bugzilla.suse.com/show_bug.cgi?id=989401
https://bugzilla.suse.com/show_bug.cgi?id=991608
https://www.suse.com/security/cve/CVE-2013-4312/
https://www.suse.com/security/cve/CVE-2015-7513/
https://www.suse.com/security/cve/CVE-2015-7833/
https://www.suse.com/security/cve/CVE-2016-0758/
https://www.suse.com/security/cve/CVE-2016-1583/
https://www.suse.com/security/cve/CVE-2016-2053/
https://www.suse.com/security/cve/CVE-2016-2187/
https://www.suse.com/security/cve/CVE-2016-3134/
https://www.suse.com/security/cve/CVE-2016-3955/
https://www.suse.com/security/cve/CVE-2016-4470/
https://www.suse.com/security/cve/CVE-2016-4482/
https://www.suse.com/security/cve/CVE-2016-4485/
https://www.suse.com/security/cve/CVE-2016-4486/
https://www.suse.com/security/cve/CVE-2016-4565/
https://www.suse.com/security/cve/CVE-2016-4569/
https://www.suse.com/security/cve/CVE-2016-4578/
https://www.suse.com/security/cve/CVE-2016-4580/
https://www.suse.com/security/cve/CVE-2016-4805/
https://www.suse.com/security/cve/CVE-2016-4913/
https://www.suse.com/security/cve/CVE-2016-4997/
https://www.suse.com/security/cve/CVE-2016-4998/
https://www.suse.com/security/cve/CVE-2016-5244/
https://www.suse.com/security/cve/CVE-2016-5696/
https://www.suse.com/security/cve/CVE-2016-5829/
Severity: Critical
ID: 93370
File Name: suse_SU-2016-2245-1.nasl
Version: 2.12
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 9/8/2016
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-bigsmp-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-bigsmp, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-pae-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/6/2016
Vulnerability Publication Date: 10/19/2015
Metasploit (Linux Kernel 4.6.3 Netfilter Privilege Escalation)
CVE: CVE-2013-4312, CVE-2015-7513, CVE-2015-7833, CVE-2016-0758, CVE-2016-1583, CVE-2016-2053, CVE-2016-2187, CVE-2016-3134, CVE-2016-3955, CVE-2016-4470, CVE-2016-4482, CVE-2016-4485, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4805, CVE-2016-4913, CVE-2016-4997, CVE-2016-4998, CVE-2016-5244, CVE-2016-5696, CVE-2016-5829, CVE-2016-6480