openSUSE Security Update : virtualbox (openSUSE-2020-1511)

high Nessus Plugin ID 140764

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for virtualbox fixes the following issues :

Version Bump to 6.0.24 (released July 14 2020 by Oracle)

This is a maintenance release. The following items were fixed and/or added :

- API: Fix unintentionally enabled audio due to a settings file version dependent bug

- VBoxManage: Fix crash of 'VBoxManage internalcommands repairhd' when processing invalid input (bug #19579)

- Guest Additions: Fix issues detecting guest additions ISO at runtime

- Fixes CVE-2020-14628,	CVE-2020-14646, CVE-2020-14647, CVE-2020-14649,	CVE-2020-14713, CVE-2020-14674, 	CVE-2020-14675, CVE-2020-14676, CVE-2020-14677, CVE-2020-14699, CVE-2020-14711, CVE-2020-14629, 	
	CVE-2020-14703, CVE-2020-14704, CVE-2020-14648, CVE-2020-14650, CVE-2020-14673, CVE-2020-14694, 	
	CVE-2020-14695, CVE-2020-14698, CVE-2020-14700, CVE-2020-14712, CVE-2020-14707, CVE-2020-14714, 	CVE-2020-14715 boo#1174159

Solution

Update the affected virtualbox packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1174159

Plugin Details

Severity: High

ID: 140764

File Name: openSUSE-2020-1511.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/24/2020

Updated: 2/20/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2020-14704

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2020-14628

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:python3-virtualbox, p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo, p-cpe:/a:novell:opensuse:virtualbox, p-cpe:/a:novell:opensuse:virtualbox-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-debugsource, p-cpe:/a:novell:opensuse:virtualbox-devel, p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons, p-cpe:/a:novell:opensuse:virtualbox-guest-source, p-cpe:/a:novell:opensuse:virtualbox-guest-tools, p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-x11, p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-host-source, p-cpe:/a:novell:opensuse:virtualbox-kmp-default, p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-qt, p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-vnc, p-cpe:/a:novell:opensuse:virtualbox-websrv, p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/23/2020

Vulnerability Publication Date: 7/15/2020

Reference Information

CVE: CVE-2020-14628, CVE-2020-14629, CVE-2020-14646, CVE-2020-14647, CVE-2020-14648, CVE-2020-14649, CVE-2020-14650, CVE-2020-14673, CVE-2020-14674, CVE-2020-14675, CVE-2020-14676, CVE-2020-14677, CVE-2020-14694, CVE-2020-14695, CVE-2020-14698, CVE-2020-14699, CVE-2020-14700, CVE-2020-14703, CVE-2020-14704, CVE-2020-14707, CVE-2020-14711, CVE-2020-14712, CVE-2020-14713, CVE-2020-14714, CVE-2020-14715