Oracle VM VirtualBox 5.2.x < 5.2.24 / 6.0.x < 6.0.2 (Jan 2019 CPU)

high Nessus Plugin ID 121247
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

An application installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.24 or 6.0.x prior to 6.0.2. It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory :

- A denial of service vulnerability in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key.
(CVE-2018-0734)

- Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. (CVE-2018-3309, CVE-2019-2500, CVE-2019-2520, CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2524, CVE-2019-2526, CVE-2019-2548, CVE-2019-2552)

- Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to potentially expose critical or confidential data.
(CVE-2019-2446, CVE-2019-2448, CVE-2019-2450, CVE-2019-2451, CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, CVE-2019-2525, CVE-2019-2553, CVE-2019-2554, CVE-2019-2555, CVE-2019-2556)

- Multiple denial of service vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to cause a denial of service condition. (CVE-2019-2508, CVE-2019-2509, CVE-2019-2527)

- An denial of service vulnerabilities with the SOAP protocol in the Core component of Oracle VirtualBox could allow an unauthenticated, remote attacker, to potentially a denial of service condition.
(CVE-2019-2511)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Oracle VM VirtualBox version 5.2.24, 6.0.2 or later as referenced in the January 2019 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?0dcafb3e

https://www.virtualbox.org/wiki/Changelog

Plugin Details

Severity: High

ID: 121247

File Name: virtualbox_jan_2019_cpu.nasl

Version: 1.6

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 1/18/2019

Updated: 11/1/2019

Dependencies: virtualbox_installed.nasl, macosx_virtualbox_installed.nbin

Risk Information

CVSS Score Source: CVE-2019-2551

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: E:POC/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:vm_virtualbox

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/15/2019

Vulnerability Publication Date: 10/30/2018

Reference Information

CVE: CVE-2018-0734, CVE-2018-0735, CVE-2018-3309, CVE-2018-5407, CVE-2019-2446, CVE-2019-2448, CVE-2019-2500, CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, CVE-2019-2508, CVE-2019-2509, CVE-2019-2511, CVE-2019-2520, CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2524, CVE-2019-2525, CVE-2019-2526, CVE-2019-2527, CVE-2019-2548, CVE-2019-2550, CVE-2019-2551, CVE-2019-2552, CVE-2019-2553, CVE-2019-2554, CVE-2019-2555, CVE-2019-2556

BID: 105750, 105758, 105897, 106568, 106572, 106574, 106613