Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 9.4
https://bugzilla.suse.com/show_bug.cgi?id=1005651
https://bugzilla.suse.com/show_bug.cgi?id=1008374
https://bugzilla.suse.com/show_bug.cgi?id=1008893
https://bugzilla.suse.com/show_bug.cgi?id=1013018
https://bugzilla.suse.com/show_bug.cgi?id=1013070
https://bugzilla.suse.com/show_bug.cgi?id=1013800
https://bugzilla.suse.com/show_bug.cgi?id=1013862
https://bugzilla.suse.com/show_bug.cgi?id=1016489
https://bugzilla.suse.com/show_bug.cgi?id=1017143
https://bugzilla.suse.com/show_bug.cgi?id=1018263
https://bugzilla.suse.com/show_bug.cgi?id=1018446
https://bugzilla.suse.com/show_bug.cgi?id=1019168
https://bugzilla.suse.com/show_bug.cgi?id=1020229
https://bugzilla.suse.com/show_bug.cgi?id=1021256
https://bugzilla.suse.com/show_bug.cgi?id=1021913
https://bugzilla.suse.com/show_bug.cgi?id=1022971
https://bugzilla.suse.com/show_bug.cgi?id=1023014
https://bugzilla.suse.com/show_bug.cgi?id=1023163
https://bugzilla.suse.com/show_bug.cgi?id=1023888
https://bugzilla.suse.com/show_bug.cgi?id=1024508
https://bugzilla.suse.com/show_bug.cgi?id=1024788
https://bugzilla.suse.com/show_bug.cgi?id=1024938
https://bugzilla.suse.com/show_bug.cgi?id=1025235
https://bugzilla.suse.com/show_bug.cgi?id=1025702
https://bugzilla.suse.com/show_bug.cgi?id=1026024
https://bugzilla.suse.com/show_bug.cgi?id=1026260
https://bugzilla.suse.com/show_bug.cgi?id=1026722
https://bugzilla.suse.com/show_bug.cgi?id=1026914
https://bugzilla.suse.com/show_bug.cgi?id=1027066
https://bugzilla.suse.com/show_bug.cgi?id=1027101
https://bugzilla.suse.com/show_bug.cgi?id=1027178
https://bugzilla.suse.com/show_bug.cgi?id=1028415
https://bugzilla.suse.com/show_bug.cgi?id=1028880
https://bugzilla.suse.com/show_bug.cgi?id=1029212
https://bugzilla.suse.com/show_bug.cgi?id=1029770
https://bugzilla.suse.com/show_bug.cgi?id=1030213
https://bugzilla.suse.com/show_bug.cgi?id=1030573
https://bugzilla.suse.com/show_bug.cgi?id=1031003
https://bugzilla.suse.com/show_bug.cgi?id=1031052
https://bugzilla.suse.com/show_bug.cgi?id=1031440
https://bugzilla.suse.com/show_bug.cgi?id=1031579
https://bugzilla.suse.com/show_bug.cgi?id=1032141
https://bugzilla.suse.com/show_bug.cgi?id=1033336
https://bugzilla.suse.com/show_bug.cgi?id=1033771
https://bugzilla.suse.com/show_bug.cgi?id=1033794
https://bugzilla.suse.com/show_bug.cgi?id=1033804
https://bugzilla.suse.com/show_bug.cgi?id=1033816
https://bugzilla.suse.com/show_bug.cgi?id=1034026
https://bugzilla.suse.com/show_bug.cgi?id=909486
https://bugzilla.suse.com/show_bug.cgi?id=911105
https://bugzilla.suse.com/show_bug.cgi?id=931620
https://bugzilla.suse.com/show_bug.cgi?id=979021
https://bugzilla.suse.com/show_bug.cgi?id=982783
https://bugzilla.suse.com/show_bug.cgi?id=983212
https://bugzilla.suse.com/show_bug.cgi?id=985561
https://bugzilla.suse.com/show_bug.cgi?id=988065
https://bugzilla.suse.com/show_bug.cgi?id=989056
https://bugzilla.suse.com/show_bug.cgi?id=995542
https://bugzilla.suse.com/show_bug.cgi?id=999245
https://www.suse.com/security/cve/CVE-2015-3288/
https://www.suse.com/security/cve/CVE-2015-8970/
https://www.suse.com/security/cve/CVE-2016-10200/
https://www.suse.com/security/cve/CVE-2016-5243/
https://www.suse.com/security/cve/CVE-2017-2671/
https://www.suse.com/security/cve/CVE-2017-5669/
https://www.suse.com/security/cve/CVE-2017-5970/
https://www.suse.com/security/cve/CVE-2017-5986/
https://www.suse.com/security/cve/CVE-2017-6074/
https://www.suse.com/security/cve/CVE-2017-6214/
https://www.suse.com/security/cve/CVE-2017-6348/
https://www.suse.com/security/cve/CVE-2017-6353/
https://www.suse.com/security/cve/CVE-2017-7184/
https://www.suse.com/security/cve/CVE-2017-7187/
https://www.suse.com/security/cve/CVE-2017-7261/
https://www.suse.com/security/cve/CVE-2017-7294/
https://www.suse.com/security/cve/CVE-2017-7308/
Severity: High
ID: 100214
File Name: suse_SU-2017-1301-1.nasl
Version: 3.12
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/16/2017
Updated: 1/19/2021
Dependencies: 12634
Risk Factor: High
VPR Score: 9.4
Base Score: 7.2
Temporal Score: 6.3
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/15/2017
Vulnerability Publication Date: 6/27/2016
Core Impact
Metasploit (AF_PACKET packet_set_ring Privilege Escalation)
CVE: CVE-2015-3288, CVE-2015-8970, CVE-2016-10200, CVE-2016-5243, CVE-2017-2671, CVE-2017-5669, CVE-2017-5970, CVE-2017-5986, CVE-2017-6074, CVE-2017-6214, CVE-2017-6348, CVE-2017-6353, CVE-2017-7184, CVE-2017-7187, CVE-2017-7261, CVE-2017-7294, CVE-2017-7308, CVE-2017-7616