Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 8.9
http://www.nessus.org/u?9d661785
https://bugzilla.novell.com/show_bug.cgi?id=472410
https://bugzilla.novell.com/show_bug.cgi?id=498708
https://bugzilla.novell.com/show_bug.cgi?id=522790
https://bugzilla.novell.com/show_bug.cgi?id=523487
https://bugzilla.novell.com/show_bug.cgi?id=533555
https://bugzilla.novell.com/show_bug.cgi?id=533677
https://bugzilla.novell.com/show_bug.cgi?id=537081
https://bugzilla.novell.com/show_bug.cgi?id=539010
https://bugzilla.novell.com/show_bug.cgi?id=540589
https://bugzilla.novell.com/show_bug.cgi?id=540997
https://bugzilla.novell.com/show_bug.cgi?id=543407
https://bugzilla.novell.com/show_bug.cgi?id=543704
https://bugzilla.novell.com/show_bug.cgi?id=544779
https://bugzilla.novell.com/show_bug.cgi?id=546491
https://bugzilla.novell.com/show_bug.cgi?id=547357
https://bugzilla.novell.com/show_bug.cgi?id=548010
https://bugzilla.novell.com/show_bug.cgi?id=548728
https://bugzilla.novell.com/show_bug.cgi?id=549030
https://bugzilla.novell.com/show_bug.cgi?id=550787
https://bugzilla.novell.com/show_bug.cgi?id=551664
https://bugzilla.novell.com/show_bug.cgi?id=552033
https://bugzilla.novell.com/show_bug.cgi?id=552154
https://bugzilla.novell.com/show_bug.cgi?id=552492
https://bugzilla.novell.com/show_bug.cgi?id=556564
https://bugzilla.novell.com/show_bug.cgi?id=556568
https://bugzilla.novell.com/show_bug.cgi?id=556899
https://bugzilla.novell.com/show_bug.cgi?id=557180
https://bugzilla.novell.com/show_bug.cgi?id=557403
https://bugzilla.novell.com/show_bug.cgi?id=557668
https://bugzilla.novell.com/show_bug.cgi?id=557683
https://bugzilla.novell.com/show_bug.cgi?id=557760
https://bugzilla.novell.com/show_bug.cgi?id=558267
https://bugzilla.novell.com/show_bug.cgi?id=559062
https://bugzilla.novell.com/show_bug.cgi?id=559132
https://bugzilla.novell.com/show_bug.cgi?id=559680
https://bugzilla.novell.com/show_bug.cgi?id=560697
https://bugzilla.novell.com/show_bug.cgi?id=561018
https://bugzilla.novell.com/show_bug.cgi?id=561235
https://bugzilla.novell.com/show_bug.cgi?id=564712
https://bugzilla.novell.com/show_bug.cgi?id=559680
https://bugzilla.novell.com/show_bug.cgi?id=541736
https://bugzilla.novell.com/show_bug.cgi?id=561018
https://bugzilla.novell.com/show_bug.cgi?id=564382
https://bugzilla.novell.com/show_bug.cgi?id=564381
Severity: High
ID: 43631
File Name: suse_11_2_kernel-091218.nasl
Version: 1.17
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/5/2010
Updated: 1/14/2021
Dependencies: ssh_get_info.nasl
Risk Factor: High
VPR Score: 8.9
Base Score: 7.8
Temporal Score: 6.8
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal Vector: E:H/RL:OF/RC:C
CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:preload-kmp-default, p-cpe:/a:novell:opensuse:preload-kmp-desktop, cpe:/o:novell:opensuse:11.2
Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/18/2009
CANVAS (CANVAS)
Core Impact
CVE: CVE-2009-1298, CVE-2009-3080, CVE-2009-3547, CVE-2009-3621, CVE-2009-3624, CVE-2009-3939, CVE-2009-4005, CVE-2009-4021, CVE-2009-4026, CVE-2009-4027, CVE-2009-4131, CVE-2009-4138, CVE-2009-4306, CVE-2009-4307, CVE-2009-4308
BID: 36723, 36793, 36901, 37019, 37036, 37068, 37069, 37170, 37231, 37277, 37339