CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.5%
MozillaFirefox ESR was updated to version 38.4.0ESR to fix multiple security issues.
MFSA 2015-116/CVE-2015-4513 Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
MFSA 2015-122/CVE-2015-7188 Trailing whitespace in IP address hostnames can bypass same-origin policy
MFSA 2015-123/CVE-2015-7189 Buffer overflow during image interactions in canvas
MFSA 2015-127/CVE-2015-7193 CORS preflight is bypassed when non-standard Content-Type headers are received
MFSA 2015-128/CVE-2015-7194 Memory corruption in libjar through zip files
MFSA 2015-130/CVE-2015-7196 JavaScript garbage collection crash with Java applet
MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200 Vulnerabilities found through code inspection
MFSA 2015-132/CVE-2015-7197 Mixed content WebSocket policy bypass through workers
MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183 NSS and NSPR memory corruption issues
It also includes fixes from 38.3.0ESR :
MFSA 2015-96/CVE-2015-4500/CVE-2015-4501 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
MFSA 2015-101/CVE-2015-4506 Buffer overflow in libvpx while parsing vp9 format video
MFSA 2015-105/CVE-2015-4511 Buffer overflow while decoding WebM video
MFSA 2015-106/CVE-2015-4509 Use-after-free while manipulating HTML media content
MFSA 2015-110/CVE-2015-4519 Dragging and dropping images exposes final URL after redirects
MFSA 2015-111/CVE-2015-4520 Errors in the handling of CORS preflight request headers
MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522 CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177 CVE-2015-7180 Vulnerabilities found through code inspection
It also includes fixes from the Firefox 38.2.1ESR release :
MFSA 2015-94/CVE-2015-4497 (bsc#943557) Use-after-free when resizing canvas element during restyling
MFSA 2015-95/CVE-2015-4498 (bsc#943558) Add-on notification bypass through data URLs
It also includes fixes from the Firefox 38.2.0ESR release :
MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
MFSA 2015-80/CVE-2015-4475 Out-of-bounds read with malformed MP3 file
MFSA 2015-82/CVE-2015-4478 Redefinition of non-configurable JavaScript object properties
MFSA 2015-83/CVE-2015-4479 Overflow issues in libstagefright
MFSA 2015-87/CVE-2015-4484 Crash when using shared memory in JavaScript
MFSA 2015-88/CVE-2015-4491 Heap overflow in gdk-pixbuf when scaling bitmap images
MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 Buffer overflows on Libvpx when decoding WebM video
MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities found through code inspection
MFSA 2015-92/CVE-2015-4492 Use-after-free in XMLHttpRequest with shared workers
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2015:2081-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(87063);
script_version("2.14");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2015-4473", "CVE-2015-4474", "CVE-2015-4475", "CVE-2015-4478", "CVE-2015-4479", "CVE-2015-4484", "CVE-2015-4485", "CVE-2015-4486", "CVE-2015-4487", "CVE-2015-4488", "CVE-2015-4489", "CVE-2015-4491", "CVE-2015-4492", "CVE-2015-4497", "CVE-2015-4498", "CVE-2015-4500", "CVE-2015-4501", "CVE-2015-4506", "CVE-2015-4509", "CVE-2015-4511", "CVE-2015-4513", "CVE-2015-4517", "CVE-2015-4519", "CVE-2015-4520", "CVE-2015-4521", "CVE-2015-4522", "CVE-2015-7174", "CVE-2015-7175", "CVE-2015-7176", "CVE-2015-7177", "CVE-2015-7180", "CVE-2015-7181", "CVE-2015-7182", "CVE-2015-7183", "CVE-2015-7188", "CVE-2015-7189", "CVE-2015-7193", "CVE-2015-7194", "CVE-2015-7196", "CVE-2015-7197", "CVE-2015-7198", "CVE-2015-7199", "CVE-2015-7200");
script_name(english:"SUSE SLES10 Security Update : Mozilla Firefox (SUSE-SU-2015:2081-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"MozillaFirefox ESR was updated to version 38.4.0ESR to fix multiple
security issues.
MFSA 2015-116/CVE-2015-4513 Miscellaneous memory safety hazards
(rv:42.0 / rv:38.4)
MFSA 2015-122/CVE-2015-7188 Trailing whitespace in IP address
hostnames can bypass same-origin policy
MFSA 2015-123/CVE-2015-7189 Buffer overflow during image interactions
in canvas
MFSA 2015-127/CVE-2015-7193 CORS preflight is bypassed when
non-standard Content-Type headers are received
MFSA 2015-128/CVE-2015-7194 Memory corruption in libjar through zip
files
MFSA 2015-130/CVE-2015-7196 JavaScript garbage collection crash with
Java applet
MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
Vulnerabilities found through code inspection
MFSA 2015-132/CVE-2015-7197 Mixed content WebSocket policy bypass
through workers
MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183 NSS and NSPR
memory corruption issues
It also includes fixes from 38.3.0ESR :
MFSA 2015-96/CVE-2015-4500/CVE-2015-4501 Miscellaneous memory safety
hazards (rv:41.0 / rv:38.3)
MFSA 2015-101/CVE-2015-4506 Buffer overflow in libvpx while parsing
vp9 format video
MFSA 2015-105/CVE-2015-4511 Buffer overflow while decoding WebM video
MFSA 2015-106/CVE-2015-4509 Use-after-free while manipulating HTML
media content
MFSA 2015-110/CVE-2015-4519 Dragging and dropping images exposes final
URL after redirects
MFSA 2015-111/CVE-2015-4520 Errors in the handling of CORS preflight
request headers
MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177 CVE-2015-7180
Vulnerabilities found through code inspection
It also includes fixes from the Firefox 38.2.1ESR release :
MFSA 2015-94/CVE-2015-4497 (bsc#943557) Use-after-free when resizing
canvas element during restyling
MFSA 2015-95/CVE-2015-4498 (bsc#943558) Add-on notification bypass
through data URLs
It also includes fixes from the Firefox 38.2.0ESR release :
MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety
hazards (rv:40.0 / rv:38.2)
MFSA 2015-80/CVE-2015-4475 Out-of-bounds read with malformed MP3 file
MFSA 2015-82/CVE-2015-4478 Redefinition of non-configurable JavaScript
object properties
MFSA 2015-83/CVE-2015-4479 Overflow issues in libstagefright
MFSA 2015-87/CVE-2015-4484 Crash when using shared memory in
JavaScript
MFSA 2015-88/CVE-2015-4491 Heap overflow in gdk-pixbuf when scaling
bitmap images
MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 Buffer overflows on Libvpx
when decoding WebM video
MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities
found through code inspection
MFSA 2015-92/CVE-2015-4492 Use-after-free in XMLHttpRequest with
shared workers
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=908275"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=940806"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=943557"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=943558"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=943608"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=947003"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=952810"
);
# https://download.suse.com/patch/finder/?keywords=bb006e2ed6738badb2b7f4f52e5c1b2a
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?e7ef3af1"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4473/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4474/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4475/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4478/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4479/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4484/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4485/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4486/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4487/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4488/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4489/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4491/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4492/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4497/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4498/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4500/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4501/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4506/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4509/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4511/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4513/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4517/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4519/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4520/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4521/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-4522/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7174/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7175/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7176/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7177/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7180/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7181/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7182/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7183/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7188/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7189/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7193/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7194/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7196/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7197/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7198/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7199/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7200/"
);
# https://www.suse.com/support/update/announcement/2015/suse-su-20152081-1.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?7087ca82"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected Mozilla Firefox packages"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-branding-SLED");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-translations");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nspr");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nspr-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nss");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nss-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nss-tools");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:10");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/08/15");
script_set_attribute(attribute:"patch_publication_date", value:"2015/11/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/25");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES10)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES10", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES10" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES10 SP4", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES10", sp:"4", cpu:"x86_64", reference:"mozilla-nspr-32bit-4.10.10-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", cpu:"x86_64", reference:"mozilla-nss-32bit-3.19.2.1-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", cpu:"s390x", reference:"mozilla-nspr-32bit-4.10.10-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", cpu:"s390x", reference:"mozilla-nss-32bit-3.19.2.1-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"mozilla-nspr-4.10.10-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"mozilla-nspr-devel-4.10.10-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"mozilla-nss-3.19.2.1-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"mozilla-nss-devel-3.19.2.1-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"mozilla-nss-tools-3.19.2.1-0.5.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"MozillaFirefox-38.4.0esr-0.7.1")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"MozillaFirefox-branding-SLED-38-0.5.3")) flag++;
if (rpm_check(release:"SLES10", sp:"4", reference:"MozillaFirefox-translations-38.4.0esr-0.7.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Mozilla Firefox");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
www.nessus.org/u?7087ca82
www.nessus.org/u?e7ef3af1
bugzilla.suse.com/show_bug.cgi?id=908275
bugzilla.suse.com/show_bug.cgi?id=940806
bugzilla.suse.com/show_bug.cgi?id=943557
bugzilla.suse.com/show_bug.cgi?id=943558
bugzilla.suse.com/show_bug.cgi?id=943608
bugzilla.suse.com/show_bug.cgi?id=947003
bugzilla.suse.com/show_bug.cgi?id=952810
www.suse.com/security/cve/CVE-2015-4473/
www.suse.com/security/cve/CVE-2015-4474/
www.suse.com/security/cve/CVE-2015-4475/
www.suse.com/security/cve/CVE-2015-4478/
www.suse.com/security/cve/CVE-2015-4479/
www.suse.com/security/cve/CVE-2015-4484/
www.suse.com/security/cve/CVE-2015-4485/
www.suse.com/security/cve/CVE-2015-4486/
www.suse.com/security/cve/CVE-2015-4487/
www.suse.com/security/cve/CVE-2015-4488/
www.suse.com/security/cve/CVE-2015-4489/
www.suse.com/security/cve/CVE-2015-4491/
www.suse.com/security/cve/CVE-2015-4492/
www.suse.com/security/cve/CVE-2015-4497/
www.suse.com/security/cve/CVE-2015-4498/
www.suse.com/security/cve/CVE-2015-4500/
www.suse.com/security/cve/CVE-2015-4501/
www.suse.com/security/cve/CVE-2015-4506/
www.suse.com/security/cve/CVE-2015-4509/
www.suse.com/security/cve/CVE-2015-4511/
www.suse.com/security/cve/CVE-2015-4513/
www.suse.com/security/cve/CVE-2015-4517/
www.suse.com/security/cve/CVE-2015-4519/
www.suse.com/security/cve/CVE-2015-4520/
www.suse.com/security/cve/CVE-2015-4521/
www.suse.com/security/cve/CVE-2015-4522/
www.suse.com/security/cve/CVE-2015-7174/
www.suse.com/security/cve/CVE-2015-7175/
www.suse.com/security/cve/CVE-2015-7176/
www.suse.com/security/cve/CVE-2015-7177/
www.suse.com/security/cve/CVE-2015-7180/
www.suse.com/security/cve/CVE-2015-7181/
www.suse.com/security/cve/CVE-2015-7182/
www.suse.com/security/cve/CVE-2015-7183/
www.suse.com/security/cve/CVE-2015-7188/
www.suse.com/security/cve/CVE-2015-7189/
www.suse.com/security/cve/CVE-2015-7193/
www.suse.com/security/cve/CVE-2015-7194/
www.suse.com/security/cve/CVE-2015-7196/
www.suse.com/security/cve/CVE-2015-7197/
www.suse.com/security/cve/CVE-2015-7198/
www.suse.com/security/cve/CVE-2015-7199/
www.suse.com/security/cve/CVE-2015-7200/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.5%