Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 8.4
https://bugzilla.suse.com/show_bug.cgi?id=1010175
https://bugzilla.suse.com/show_bug.cgi?id=1034862
https://bugzilla.suse.com/show_bug.cgi?id=1045327
https://bugzilla.suse.com/show_bug.cgi?id=1050231
https://bugzilla.suse.com/show_bug.cgi?id=1052593
https://bugzilla.suse.com/show_bug.cgi?id=1056982
https://bugzilla.suse.com/show_bug.cgi?id=1057179
https://bugzilla.suse.com/show_bug.cgi?id=1057389
https://bugzilla.suse.com/show_bug.cgi?id=1058524
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://bugzilla.suse.com/show_bug.cgi?id=1063544
https://bugzilla.suse.com/show_bug.cgi?id=1063667
https://bugzilla.suse.com/show_bug.cgi?id=1066295
https://bugzilla.suse.com/show_bug.cgi?id=1066472
https://bugzilla.suse.com/show_bug.cgi?id=1066569
https://bugzilla.suse.com/show_bug.cgi?id=1066573
https://bugzilla.suse.com/show_bug.cgi?id=1066606
https://bugzilla.suse.com/show_bug.cgi?id=1066618
https://bugzilla.suse.com/show_bug.cgi?id=1066625
https://bugzilla.suse.com/show_bug.cgi?id=1066650
https://bugzilla.suse.com/show_bug.cgi?id=1066671
https://bugzilla.suse.com/show_bug.cgi?id=1066693
https://bugzilla.suse.com/show_bug.cgi?id=1066700
https://bugzilla.suse.com/show_bug.cgi?id=1066705
https://bugzilla.suse.com/show_bug.cgi?id=1067085
https://bugzilla.suse.com/show_bug.cgi?id=1068032
https://bugzilla.suse.com/show_bug.cgi?id=1068671
https://bugzilla.suse.com/show_bug.cgi?id=1069702
https://bugzilla.suse.com/show_bug.cgi?id=1069708
https://bugzilla.suse.com/show_bug.cgi?id=1070771
https://bugzilla.suse.com/show_bug.cgi?id=1071074
https://bugzilla.suse.com/show_bug.cgi?id=1071470
https://bugzilla.suse.com/show_bug.cgi?id=1071695
https://bugzilla.suse.com/show_bug.cgi?id=1072561
https://bugzilla.suse.com/show_bug.cgi?id=1072876
https://bugzilla.suse.com/show_bug.cgi?id=1073792
https://bugzilla.suse.com/show_bug.cgi?id=1073874
https://bugzilla.suse.com/show_bug.cgi?id=1074033
https://bugzilla.suse.com/show_bug.cgi?id=999245
https://www.suse.com/security/cve/CVE-2017-1000251/
https://www.suse.com/security/cve/CVE-2017-11600/
https://www.suse.com/security/cve/CVE-2017-13080/
https://www.suse.com/security/cve/CVE-2017-13167/
https://www.suse.com/security/cve/CVE-2017-14106/
https://www.suse.com/security/cve/CVE-2017-14140/
https://www.suse.com/security/cve/CVE-2017-14340/
https://www.suse.com/security/cve/CVE-2017-15102/
https://www.suse.com/security/cve/CVE-2017-15115/
https://www.suse.com/security/cve/CVE-2017-15265/
https://www.suse.com/security/cve/CVE-2017-15274/
https://www.suse.com/security/cve/CVE-2017-15868/
https://www.suse.com/security/cve/CVE-2017-16525/
https://www.suse.com/security/cve/CVE-2017-16527/
https://www.suse.com/security/cve/CVE-2017-16529/
https://www.suse.com/security/cve/CVE-2017-16531/
https://www.suse.com/security/cve/CVE-2017-16534/
https://www.suse.com/security/cve/CVE-2017-16535/
https://www.suse.com/security/cve/CVE-2017-16536/
https://www.suse.com/security/cve/CVE-2017-16537/
https://www.suse.com/security/cve/CVE-2017-16538/
https://www.suse.com/security/cve/CVE-2017-16649/
https://www.suse.com/security/cve/CVE-2017-16939/
https://www.suse.com/security/cve/CVE-2017-17450/
https://www.suse.com/security/cve/CVE-2017-17558/
https://www.suse.com/security/cve/CVE-2017-17805/
https://www.suse.com/security/cve/CVE-2017-17806/
https://www.suse.com/security/cve/CVE-2017-5715/
https://www.suse.com/security/cve/CVE-2017-5753/
https://www.suse.com/security/cve/CVE-2017-5754/
https://www.suse.com/security/cve/CVE-2017-7472/
Severity: High
ID: 105685
File Name: suse_SU-2018-0040-1.nasl
Version: 3.13
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/9/2018
Updated: 1/19/2021
Dependencies: ssh_get_info.nasl
Risk Factor: High
VPR Score: 8.4
Base Score: 7.7
Temporal Score: 6.7
Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
Base Score: 8
Temporal Score: 7.6
Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-bigsmp, p-cpe:/a:novell:suse_linux:kernel-bigsmp-base, p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/8/2018
Vulnerability Publication Date: 5/11/2017
CANVAS (CANVAS)
CVE: CVE-2017-1000251, CVE-2017-11600, CVE-2017-12192, CVE-2017-13080, CVE-2017-13167, CVE-2017-14106, CVE-2017-14140, CVE-2017-14340, CVE-2017-15102, CVE-2017-15115, CVE-2017-15265, CVE-2017-15274, CVE-2017-15868, CVE-2017-16525, CVE-2017-16527, CVE-2017-16529, CVE-2017-16531, CVE-2017-16534, CVE-2017-16535, CVE-2017-16536, CVE-2017-16537, CVE-2017-16538, CVE-2017-16649, CVE-2017-16939, CVE-2017-17450, CVE-2017-17558, CVE-2017-17805, CVE-2017-17806, CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2017-7472, CVE-2017-8824
IAVA: 2017-A-0310, 2018-A-0019, 2018-A-0020