Lucene search

K
kasperskyKaspersky LabKLA11521
HistoryJul 16, 2019 - 12:00 a.m.

KLA11521 Multiple vulnerabilities in Oracle VirtualBox

2019-07-1600:00:00
Kaspersky Lab
threats.kaspersky.com
19

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.025

Percentile

90.2%

Multiple vulnerabilities were found in Oracle VirtualBox. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Multiple vulnerabilities in Core component of Oracle VM VirtualBox can be exploited locally to unspecified impact;
  2. Vulnerability in Core (OpenSSL) component of Oracle VM VirtualBox can be exploited remotely to obtain sensitive information and bypass security restrictions.

Technical details

The vulnerability affects Windows platforms only.

Original advisories

Oracle Critical Patch Update Advisory – July 2019

Related products

Oracle-VirtualBox

CVE list

CVE-2019-2859 warning

CVE-2019-2867 warning

CVE-2019-2866 warning

CVE-2019-2864 warning

CVE-2019-2865 warning

CVE-2019-1543 high

CVE-2019-2863 warning

CVE-2019-2848 warning

CVE-2019-2877 warning

CVE-2019-2873 warning

CVE-2019-2874 warning

CVE-2019-2875 warning

CVE-2019-2876 warning

CVE-2019-2850 warning

Solution

Update to the latest version

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • RLF

Read Local Files. Exploitation of vulnerabilities with this impact can lead to reading some inaccessible files. Files that can be read depends on conсrete program errors.

Affected Products

  • Oracle VirtualBox prior to 5.2.32, prior to 6.0.10

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.025

Percentile

90.2%