Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 9.5
https://bugzilla.suse.com/show_bug.cgi?id=1091041
https://bugzilla.suse.com/show_bug.cgi?id=1119461
https://bugzilla.suse.com/show_bug.cgi?id=1119465
https://bugzilla.suse.com/show_bug.cgi?id=1131107
https://bugzilla.suse.com/show_bug.cgi?id=1138190
https://bugzilla.suse.com/show_bug.cgi?id=1146544
https://bugzilla.suse.com/show_bug.cgi?id=1146612
https://bugzilla.suse.com/show_bug.cgi?id=1150466
https://bugzilla.suse.com/show_bug.cgi?id=1150483
https://bugzilla.suse.com/show_bug.cgi?id=1152631
https://bugzilla.suse.com/show_bug.cgi?id=1153811
https://bugzilla.suse.com/show_bug.cgi?id=1154905
https://bugzilla.suse.com/show_bug.cgi?id=1155689
https://bugzilla.suse.com/show_bug.cgi?id=1155897
https://bugzilla.suse.com/show_bug.cgi?id=1155898
https://bugzilla.suse.com/show_bug.cgi?id=1156187
https://bugzilla.suse.com/show_bug.cgi?id=1157038
https://bugzilla.suse.com/show_bug.cgi?id=1157042
https://bugzilla.suse.com/show_bug.cgi?id=1157070
https://bugzilla.suse.com/show_bug.cgi?id=1157143
https://bugzilla.suse.com/show_bug.cgi?id=1157158
https://bugzilla.suse.com/show_bug.cgi?id=1157191
https://bugzilla.suse.com/show_bug.cgi?id=1157324
https://bugzilla.suse.com/show_bug.cgi?id=1157333
https://bugzilla.suse.com/show_bug.cgi?id=1157464
https://bugzilla.suse.com/show_bug.cgi?id=1158132
https://bugzilla.suse.com/show_bug.cgi?id=1158394
https://bugzilla.suse.com/show_bug.cgi?id=1158398
https://bugzilla.suse.com/show_bug.cgi?id=1158410
https://bugzilla.suse.com/show_bug.cgi?id=1158413
https://bugzilla.suse.com/show_bug.cgi?id=1158417
https://bugzilla.suse.com/show_bug.cgi?id=1158445
https://bugzilla.suse.com/show_bug.cgi?id=1158823
https://bugzilla.suse.com/show_bug.cgi?id=1158824
https://bugzilla.suse.com/show_bug.cgi?id=1158827
https://bugzilla.suse.com/show_bug.cgi?id=1158834
https://bugzilla.suse.com/show_bug.cgi?id=1158900
https://bugzilla.suse.com/show_bug.cgi?id=1158903
https://bugzilla.suse.com/show_bug.cgi?id=1158904
https://bugzilla.suse.com/show_bug.cgi?id=1158954
https://www.suse.com/security/cve/CVE-2019-14895/
https://www.suse.com/security/cve/CVE-2019-15213/
https://www.suse.com/security/cve/CVE-2019-16231/
https://www.suse.com/security/cve/CVE-2019-18660/
https://www.suse.com/security/cve/CVE-2019-18680/
https://www.suse.com/security/cve/CVE-2019-18683/
https://www.suse.com/security/cve/CVE-2019-18805/
https://www.suse.com/security/cve/CVE-2019-19052/
https://www.suse.com/security/cve/CVE-2019-19062/
https://www.suse.com/security/cve/CVE-2019-19065/
https://www.suse.com/security/cve/CVE-2019-19073/
https://www.suse.com/security/cve/CVE-2019-19074/
https://www.suse.com/security/cve/CVE-2019-19332/
https://www.suse.com/security/cve/CVE-2019-19338/
https://www.suse.com/security/cve/CVE-2019-19523/
https://www.suse.com/security/cve/CVE-2019-19524/
https://www.suse.com/security/cve/CVE-2019-19525/
https://www.suse.com/security/cve/CVE-2019-19527/
https://www.suse.com/security/cve/CVE-2019-19530/
https://www.suse.com/security/cve/CVE-2019-19531/
https://www.suse.com/security/cve/CVE-2019-19532/
https://www.suse.com/security/cve/CVE-2019-19533/
https://www.suse.com/security/cve/CVE-2019-19534/
https://www.suse.com/security/cve/CVE-2019-19535/
https://www.suse.com/security/cve/CVE-2019-19536/
Severity: High
ID: 132390
File Name: suse_SU-2019-3379-1.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/23/2019
Updated: 1/13/2021
Dependencies: 12634
Risk Factor: High
VPR Score: 9.5
CVSS Score Source: CVE-2019-18805
Base Score: 7.5
Temporal Score: 5.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal Vector: E:U/RL:OF/RC:C
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_113-default, p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_113-default-debuginfo, cpe:/o:novell:suse_linux:12
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/21/2019
Vulnerability Publication Date: 8/19/2019
CVE: CVE-2019-14895, CVE-2019-15213, CVE-2019-16231, CVE-2019-18660, CVE-2019-18680, CVE-2019-18683, CVE-2019-18805, CVE-2019-19052, CVE-2019-19062, CVE-2019-19065, CVE-2019-19073, CVE-2019-19074, CVE-2019-19332, CVE-2019-19338, CVE-2019-19523, CVE-2019-19524, CVE-2019-19525, CVE-2019-19527, CVE-2019-19530, CVE-2019-19531, CVE-2019-19532, CVE-2019-19533, CVE-2019-19534, CVE-2019-19535, CVE-2019-19536, CVE-2019-19537