Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2019.0216
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2019-0216)
Resumen:The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2019-0216 advisory.
Descripción:Summary:
The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2019-0216 advisory.

Vulnerability Insight:
OpenSSL versions 1.1.0 through 1.1.0j and 1.1.1 through 1.1.1b are
susceptible to a vulnerability that could lead to disclosure of sensitive
information or the addition or modification of data (CVE-2019-1543).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of Oracle VM VirtualBox (CVE-2019-2848).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful
attacks require human interaction from a person other than the attacker.
Successful attacks of this vulnerability can result in unauthorized ability
to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox
(CVE-2019-2850).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
takeover of Oracle VM VirtualBox (CVE-2019-2859).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
that allows low privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
unauthorized access to critical data or complete access to all Oracle VM
VirtualBox accessible data (CVE-2019-2863).

Oracle VM VirtualBox prior to 6.0.10 has a difficult to exploit
vulnerability allows high privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle
VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks
may significantly impact additional products. Successful attacks of this
vulnerability can result in takeover of Oracle VM VirtualBox
(CVE-2019-2864, CVE-2019-2865).

Oracle VM VirtualBox prior to 6.0.10 has an easily exploitable vulnerability
allows high privileged attacker with logon to the infrastructure where
Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
additional products. Successful attacks of this vulnerability can ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) on Mageia 6, Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-1543
Bugtraq: 20190701 [SECURITY] [DSA 4475-1] openssl security update (Google Search)
https://seclists.org/bugtraq/2019/Jul/3
Debian Security Information: DSA-4475 (Google Search)
https://www.debian.org/security/2019/dsa-4475
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
RedHat Security Advisories: RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3700
SuSE Security Announcement: openSUSE-SU-2019:1814 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-2848
https://security.gentoo.org/glsa/202101-09
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-2850
Common Vulnerability Exposure (CVE) ID: CVE-2019-2859
Common Vulnerability Exposure (CVE) ID: CVE-2019-2863
Common Vulnerability Exposure (CVE) ID: CVE-2019-2864
Common Vulnerability Exposure (CVE) ID: CVE-2019-2865
Common Vulnerability Exposure (CVE) ID: CVE-2019-2866
Common Vulnerability Exposure (CVE) ID: CVE-2019-2867
https://www.zerodayinitiative.com/advisories/ZDI-19-963/
https://www.zerodayinitiative.com/advisories/ZDI-19-964/
https://www.zerodayinitiative.com/advisories/ZDI-19-965/
Common Vulnerability Exposure (CVE) ID: CVE-2019-2873
Common Vulnerability Exposure (CVE) ID: CVE-2019-2874
Common Vulnerability Exposure (CVE) ID: CVE-2019-2875
Common Vulnerability Exposure (CVE) ID: CVE-2019-2876
Common Vulnerability Exposure (CVE) ID: CVE-2019-2877
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.