Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2019.0216
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2019-0216)
Zusammenfassung:The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2019-0216 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2019-0216 advisory.

Vulnerability Insight:
OpenSSL versions 1.1.0 through 1.1.0j and 1.1.1 through 1.1.1b are
susceptible to a vulnerability that could lead to disclosure of sensitive
information or the addition or modification of data (CVE-2019-1543).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of Oracle VM VirtualBox (CVE-2019-2848).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful
attacks require human interaction from a person other than the attacker.
Successful attacks of this vulnerability can result in unauthorized ability
to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox
(CVE-2019-2850).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
takeover of Oracle VM VirtualBox (CVE-2019-2859).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
unauthorized access to critical data or complete access to all Oracle VM
VirtualBox accessible data (CVE-2019-2863).

Oracle VM VirtualBox prior to 6.0.10 has a difficult to exploit
vulnerability allows high privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle
VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks
may significantly impact additional products. Successful attacks of this
vulnerability can result in takeover of Oracle VM VirtualBox
(CVE-2019-2864, CVE-2019-2865).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
allows high privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) on Mageia 6, Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-1543
Bugtraq: 20190701 [SECURITY] [DSA 4475-1] openssl security update (Google Search)
https://seclists.org/bugtraq/2019/Jul/3
Debian Security Information: DSA-4475 (Google Search)
https://www.debian.org/security/2019/dsa-4475
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
RedHat Security Advisories: RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3700
SuSE Security Announcement: openSUSE-SU-2019:1814 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-2848
https://security.gentoo.org/glsa/202101-09
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-2850
Common Vulnerability Exposure (CVE) ID: CVE-2019-2859
Common Vulnerability Exposure (CVE) ID: CVE-2019-2863
Common Vulnerability Exposure (CVE) ID: CVE-2019-2864
Common Vulnerability Exposure (CVE) ID: CVE-2019-2865
Common Vulnerability Exposure (CVE) ID: CVE-2019-2866
Common Vulnerability Exposure (CVE) ID: CVE-2019-2867
https://www.zerodayinitiative.com/advisories/ZDI-19-963/
https://www.zerodayinitiative.com/advisories/ZDI-19-964/
https://www.zerodayinitiative.com/advisories/ZDI-19-965/
Common Vulnerability Exposure (CVE) ID: CVE-2019-2873
Common Vulnerability Exposure (CVE) ID: CVE-2019-2874
Common Vulnerability Exposure (CVE) ID: CVE-2019-2875
Common Vulnerability Exposure (CVE) ID: CVE-2019-2876
Common Vulnerability Exposure (CVE) ID: CVE-2019-2877
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.