Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 5.9
https://bugzilla.suse.com/show_bug.cgi?id=1179202
https://bugzilla.suse.com/show_bug.cgi?id=1179208
https://bugzilla.suse.com/show_bug.cgi?id=1179212
https://bugzilla.suse.com/show_bug.cgi?id=1179221
https://bugzilla.suse.com/show_bug.cgi?id=1179223
https://bugzilla.suse.com/show_bug.cgi?id=1179240
https://bugzilla.suse.com/show_bug.cgi?id=1179244
https://bugzilla.suse.com/show_bug.cgi?id=1179260
https://bugzilla.suse.com/show_bug.cgi?id=1179268
https://bugzilla.suse.com/show_bug.cgi?id=1179269
https://bugzilla.suse.com/show_bug.cgi?id=1179276
https://bugzilla.suse.com/show_bug.cgi?id=1179278
https://bugzilla.suse.com/show_bug.cgi?id=1179281
https://bugzilla.suse.com/show_bug.cgi?id=1179285
https://bugzilla.suse.com/show_bug.cgi?id=1179311
https://bugzilla.suse.com/show_bug.cgi?id=1179312
https://bugzilla.suse.com/show_bug.cgi?id=1179313
https://bugzilla.suse.com/show_bug.cgi?id=1179315
https://bugzilla.suse.com/show_bug.cgi?id=1179317
https://bugzilla.suse.com/show_bug.cgi?id=1179321
https://bugzilla.suse.com/show_bug.cgi?id=1179322
https://bugzilla.suse.com/show_bug.cgi?id=1179327
https://bugzilla.suse.com/show_bug.cgi?id=1179333
https://bugzilla.suse.com/show_bug.cgi?id=1179336
https://bugzilla.suse.com/show_bug.cgi?id=1179338
https://bugzilla.suse.com/show_bug.cgi?id=1179339
https://bugzilla.suse.com/show_bug.cgi?id=1179343
https://bugzilla.suse.com/show_bug.cgi?id=1179345
https://bugzilla.suse.com/show_bug.cgi?id=1179346
https://bugzilla.suse.com/show_bug.cgi?id=1179347
https://bugzilla.suse.com/show_bug.cgi?id=1179361
https://bugzilla.suse.com/show_bug.cgi?id=1179362
https://bugzilla.suse.com/show_bug.cgi?id=1179397
https://bugzilla.suse.com/show_bug.cgi?id=1179753
https://www.suse.com/security/cve/CVE-2020-25664/
https://www.suse.com/security/cve/CVE-2020-25665/
https://www.suse.com/security/cve/CVE-2020-25666/
https://www.suse.com/security/cve/CVE-2020-25674/
https://www.suse.com/security/cve/CVE-2020-25675/
https://www.suse.com/security/cve/CVE-2020-25676/
https://www.suse.com/security/cve/CVE-2020-27750/
https://www.suse.com/security/cve/CVE-2020-27751/
https://www.suse.com/security/cve/CVE-2020-27752/
https://www.suse.com/security/cve/CVE-2020-27753/
https://www.suse.com/security/cve/CVE-2020-27754/
https://www.suse.com/security/cve/CVE-2020-27755/
https://www.suse.com/security/cve/CVE-2020-27756/
https://www.suse.com/security/cve/CVE-2020-27757/
https://www.suse.com/security/cve/CVE-2020-27758/
https://www.suse.com/security/cve/CVE-2020-27759/
https://www.suse.com/security/cve/CVE-2020-27760/
https://www.suse.com/security/cve/CVE-2020-27761/
https://www.suse.com/security/cve/CVE-2020-27762/
https://www.suse.com/security/cve/CVE-2020-27763/
https://www.suse.com/security/cve/CVE-2020-27764/
https://www.suse.com/security/cve/CVE-2020-27765/
https://www.suse.com/security/cve/CVE-2020-27766/
https://www.suse.com/security/cve/CVE-2020-27767/
https://www.suse.com/security/cve/CVE-2020-27768/
https://www.suse.com/security/cve/CVE-2020-27769/
https://www.suse.com/security/cve/CVE-2020-27770/
https://www.suse.com/security/cve/CVE-2020-27771/
https://www.suse.com/security/cve/CVE-2020-27772/
https://www.suse.com/security/cve/CVE-2020-27773/
https://www.suse.com/security/cve/CVE-2020-27774/
https://www.suse.com/security/cve/CVE-2020-27775/
https://www.suse.com/security/cve/CVE-2020-27776/
Severity: Medium
ID: 145198
File Name: suse_SU-2021-0153-1.nasl
Version: 1.2
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/20/2021
Updated: 1/22/2021
Dependencies: 12634
Risk Factor: Medium
VPR Score: 5.9
Base Score: 6.8
Temporal Score: 5
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal Vector: E:U/RL:OF/RC:C
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:ImageMagick, p-cpe:/a:novell:suse_linux:ImageMagick-config-7-SUSE, p-cpe:/a:novell:suse_linux:ImageMagick-config-7-upstream, p-cpe:/a:novell:suse_linux:ImageMagick-debuginfo, p-cpe:/a:novell:suse_linux:ImageMagick-debugsource, p-cpe:/a:novell:suse_linux:ImageMagick-devel, p-cpe:/a:novell:suse_linux:libMagick++, p-cpe:/a:novell:suse_linux:libMagick++-7_Q16HDRI4-debuginfo, p-cpe:/a:novell:suse_linux:libMagick++-devel, p-cpe:/a:novell:suse_linux:libMagickCore, p-cpe:/a:novell:suse_linux:libMagickCore-7_Q16HDRI6-debuginfo, p-cpe:/a:novell:suse_linux:libMagickWand, p-cpe:/a:novell:suse_linux:libMagickWand-7_Q16HDRI6-debuginfo, p-cpe:/a:novell:suse_linux:perl-PerlMagick, p-cpe:/a:novell:suse_linux:perl-PerlMagick-debuginfo, cpe:/o:novell:suse_linux:15
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 1/15/2021
Vulnerability Publication Date: 12/3/2020
CVE: CVE-2020-25664, CVE-2020-25665, CVE-2020-25666, CVE-2020-25674, CVE-2020-25675, CVE-2020-25676, CVE-2020-27750, CVE-2020-27751, CVE-2020-27752, CVE-2020-27753, CVE-2020-27754, CVE-2020-27755, CVE-2020-27756, CVE-2020-27757, CVE-2020-27758, CVE-2020-27759, CVE-2020-27760, CVE-2020-27761, CVE-2020-27762, CVE-2020-27763, CVE-2020-27764, CVE-2020-27765, CVE-2020-27766, CVE-2020-27767, CVE-2020-27768, CVE-2020-27769, CVE-2020-27770, CVE-2020-27771, CVE-2020-27772, CVE-2020-27773, CVE-2020-27774, CVE-2020-27775, CVE-2020-27776, CVE-2020-29599