Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310804194
HistoryJan 23, 2014 - 12:00 a.m.

Oracle VM VirtualBox Unspecified Vulnerability-01 (Jan 2014) - Linux

2014-01-2300:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
10

6.2 Medium

AI Score

Confidence

Low

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

32.1%

Oracle VM VirtualBox is prone to an unspecified vulnerability.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.804194");
  script_version("2024-02-20T14:37:13+0000");
  script_cve_id("CVE-2013-5892");
  script_tag(name:"cvss_base", value:"3.5");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:H/Au:S/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-02-20 14:37:13 +0000 (Tue, 20 Feb 2024)");
  script_tag(name:"creation_date", value:"2014-01-23 10:45:12 +0530 (Thu, 23 Jan 2014)");
  script_name("Oracle VM VirtualBox Unspecified Vulnerability-01 (Jan 2014) - Linux");

  script_tag(name:"summary", value:"Oracle VM VirtualBox is prone to an unspecified vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The flaw is due to unspecified errors related to 'core' subcomponent.");

  script_tag(name:"impact", value:"Successful exploitation will allow local users to affect confidentiality,
  integrity, and availability via unknown vectors.");

  script_tag(name:"affected", value:"Oracle VM VirtualBox before version 3.2.20, before version 4.0.22, before
  version 4.1.30, before version 4.2.22 and before version 4.3.6 on Linux.");

  script_tag(name:"solution", value:"Apply the patch from the referenced advisory.");

  script_tag(name:"qod_type", value:"executable_version");
  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://secunia.com/advisories/56490");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64909");
  script_xref(name:"URL", value:"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_sun_virtualbox_detect_lin.nasl");
  script_mandatory_keys("Sun/VirtualBox/Lin/Ver");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

cpe_list = make_list("cpe:/a:oracle:vm_virtualbox", "cpe:/a:sun:virtualbox");

if(!infos = get_app_version_and_location_from_list(cpe_list:cpe_list, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_in_range(version:vers, test_version:"3.2.0", test_version2:"3.2.19")||
   version_in_range(version:vers, test_version:"4.0.0", test_version2:"4.0.21")||
   version_in_range(version:vers, test_version:"4.1.0", test_version2:"4.1.29")||
   version_in_range(version:vers, test_version:"4.2.0", test_version2:"4.2.21")||
   version_in_range(version:vers, test_version:"4.3.0", test_version2:"4.3.5")) {
  security_message( port: 0, data: "The target host was found to be vulnerable" );
}

6.2 Medium

AI Score

Confidence

Low

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

32.1%