Language:
https://bugzilla.suse.com/show_bug.cgi?id=893323
https://bugzilla.suse.com/show_bug.cgi?id=944697
https://bugzilla.suse.com/show_bug.cgi?id=967012
https://bugzilla.suse.com/show_bug.cgi?id=967013
https://bugzilla.suse.com/show_bug.cgi?id=982017
https://bugzilla.suse.com/show_bug.cgi?id=982018
https://bugzilla.suse.com/show_bug.cgi?id=982019
https://bugzilla.suse.com/show_bug.cgi?id=982222
https://bugzilla.suse.com/show_bug.cgi?id=982223
https://bugzilla.suse.com/show_bug.cgi?id=982285
https://bugzilla.suse.com/show_bug.cgi?id=982959
https://bugzilla.suse.com/show_bug.cgi?id=983961
https://bugzilla.suse.com/show_bug.cgi?id=983982
https://bugzilla.suse.com/show_bug.cgi?id=991080
https://bugzilla.suse.com/show_bug.cgi?id=991466
https://bugzilla.suse.com/show_bug.cgi?id=994760
https://bugzilla.suse.com/show_bug.cgi?id=994771
https://bugzilla.suse.com/show_bug.cgi?id=994774
https://bugzilla.suse.com/show_bug.cgi?id=996441
https://bugzilla.suse.com/show_bug.cgi?id=997858
https://bugzilla.suse.com/show_bug.cgi?id=997859
https://www.suse.com/security/cve/CVE-2014-5388/
https://www.suse.com/security/cve/CVE-2015-6815/
https://www.suse.com/security/cve/CVE-2016-2391/
https://www.suse.com/security/cve/CVE-2016-2392/
https://www.suse.com/security/cve/CVE-2016-4453/
https://www.suse.com/security/cve/CVE-2016-4454/
https://www.suse.com/security/cve/CVE-2016-5105/
https://www.suse.com/security/cve/CVE-2016-5106/
https://www.suse.com/security/cve/CVE-2016-5107/
https://www.suse.com/security/cve/CVE-2016-5126/
https://www.suse.com/security/cve/CVE-2016-5238/
https://www.suse.com/security/cve/CVE-2016-5337/
https://www.suse.com/security/cve/CVE-2016-5338/
https://www.suse.com/security/cve/CVE-2016-5403/
https://www.suse.com/security/cve/CVE-2016-6490/
https://www.suse.com/security/cve/CVE-2016-6833/
https://www.suse.com/security/cve/CVE-2016-6836/
https://www.suse.com/security/cve/CVE-2016-6888/
https://www.suse.com/security/cve/CVE-2016-7116/
https://www.suse.com/security/cve/CVE-2016-7155/
Severity: High
ID: 94758
File Name: suse_SU-2016-2781-1.nasl
Version: 2.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 11/14/2016
Updated: 1/6/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 4.9
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:qemu-x86, p-cpe:/a:novell:suse_linux:qemu, p-cpe:/a:novell:suse_linux:qemu-block-curl, p-cpe:/a:novell:suse_linux:qemu-debugsource, p-cpe:/a:novell:suse_linux:qemu-s390-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-curl-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools-debuginfo, p-cpe:/a:novell:suse_linux:qemu-lang, p-cpe:/a:novell:suse_linux:qemu-x86-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-rbd-debuginfo, p-cpe:/a:novell:suse_linux:qemu-block-rbd, p-cpe:/a:novell:suse_linux:qemu-kvm, p-cpe:/a:novell:suse_linux:qemu-guest-agent-debuginfo, p-cpe:/a:novell:suse_linux:qemu-tools, p-cpe:/a:novell:suse_linux:qemu-guest-agent, p-cpe:/a:novell:suse_linux:qemu-s390
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 11/11/2016
Vulnerability Publication Date: 11/15/2014
CVE: CVE-2014-5388, CVE-2015-6815, CVE-2016-2391, CVE-2016-2392, CVE-2016-4453, CVE-2016-4454, CVE-2016-5105, CVE-2016-5106, CVE-2016-5107, CVE-2016-5126, CVE-2016-5238, CVE-2016-5337, CVE-2016-5338, CVE-2016-5403, CVE-2016-6490, CVE-2016-6833, CVE-2016-6836, CVE-2016-6888, CVE-2016-7116, CVE-2016-7155, CVE-2016-7156
BID: 69356