openSUSE Security Update : virtualbox (openSUSE-2018-75) (Spectre)

high Nessus Plugin ID 106289

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for virtualbox to version 5.1.32 fixes the following issues :

The following vulnerabilities were fixed (boo#1076372) :

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, also known as 'Spectre', bsc#1068032.

- CVE-2018-2676: Local authenticated attacker may gain elevated privileges

- CVE-2018-2685: Local authenticated attacker may gain elevated privileges

- CVE-2018-2686: Local authenticated attacker may gain elevated privileges

- CVE-2018-2687: Local authenticated attacker may gain elevated privileges

- CVE-2018-2688: Local authenticated attacker may gain elevated privileges

- CVE-2018-2689: Local authenticated attacker may gain elevated privileges

- CVE-2018-2690: Local authenticated attacker may gain elevated privileges

- CVE-2018-2693: Local authenticated attacker may gain elevated privileges via guest additions

- CVE-2018-2694: Local authenticated attacker may gain elevated privileges

- CVE-2018-2698: Local authenticated attacker may gain elevated privileges

The following bug fixes are included :

- fix occasional screen corruption when host screen resolution is changed

- increase proposed disk size when creating new VMs for Windows 7 and newer

- fix broken communication with certain devices on Linux hosts

- Fix problems using 256MB VRAM in raw-mode VMs

- add HDA support for more exotic guests (e.g. Haiku)

- fix playback with ALSA backend (5.1.28 regression)

- fix a problem where OHCI emulation might sporadically drop data transfers

Solution

Update the affected virtualbox packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1068032

https://bugzilla.opensuse.org/show_bug.cgi?id=1076372

Plugin Details

Severity: High

ID: 106289

File Name: openSUSE-2018-75.nasl

Version: 3.13

Type: local

Agent: unix

Published: 1/24/2018

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:python-virtualbox, p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo, p-cpe:/a:novell:opensuse:virtualbox, p-cpe:/a:novell:opensuse:virtualbox-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-debugsource, p-cpe:/a:novell:opensuse:virtualbox-devel, p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-source, p-cpe:/a:novell:opensuse:virtualbox-guest-tools, p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-x11, p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-host-source, p-cpe:/a:novell:opensuse:virtualbox-qt, p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-vnc, p-cpe:/a:novell:opensuse:virtualbox-websrv, p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo, cpe:/o:novell:opensuse:42.2, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/23/2018

Vulnerability Publication Date: 1/4/2018

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-5715, CVE-2018-2676, CVE-2018-2685, CVE-2018-2686, CVE-2018-2687, CVE-2018-2688, CVE-2018-2689, CVE-2018-2690, CVE-2018-2693, CVE-2018-2694, CVE-2018-2698

IAVA: 2018-A-0020