Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 5.9
https://bugzilla.novell.com/show_bug.cgi?id=611264
https://bugzilla.novell.com/show_bug.cgi?id=617344
https://bugzilla.novell.com/show_bug.cgi?id=624072
https://bugzilla.novell.com/show_bug.cgi?id=652942
https://bugzilla.novell.com/show_bug.cgi?id=668194
https://bugzilla.novell.com/show_bug.cgi?id=676204
https://bugzilla.novell.com/show_bug.cgi?id=688079
https://bugzilla.novell.com/show_bug.cgi?id=693639
https://bugzilla.novell.com/show_bug.cgi?id=697920
https://bugzilla.novell.com/show_bug.cgi?id=700449
https://bugzilla.novell.com/show_bug.cgi?id=704280
https://bugzilla.novell.com/show_bug.cgi?id=713148
https://bugzilla.novell.com/show_bug.cgi?id=714507
https://bugzilla.novell.com/show_bug.cgi?id=716850
https://bugzilla.novell.com/show_bug.cgi?id=717994
https://bugzilla.novell.com/show_bug.cgi?id=719793
https://bugzilla.novell.com/show_bug.cgi?id=720374
https://bugzilla.novell.com/show_bug.cgi?id=721366
https://bugzilla.novell.com/show_bug.cgi?id=727834
https://bugzilla.novell.com/show_bug.cgi?id=729247
https://bugzilla.novell.com/show_bug.cgi?id=731809
https://bugzilla.novell.com/show_bug.cgi?id=733761
https://bugzilla.novell.com/show_bug.cgi?id=734300
https://bugzilla.novell.com/show_bug.cgi?id=734900
https://bugzilla.novell.com/show_bug.cgi?id=737326
https://bugzilla.novell.com/show_bug.cgi?id=738210
https://bugzilla.novell.com/show_bug.cgi?id=738503
https://bugzilla.novell.com/show_bug.cgi?id=738528
https://bugzilla.novell.com/show_bug.cgi?id=738679
https://bugzilla.novell.com/show_bug.cgi?id=740180
https://bugzilla.novell.com/show_bug.cgi?id=740895
https://bugzilla.novell.com/show_bug.cgi?id=740969
https://bugzilla.novell.com/show_bug.cgi?id=742210
https://bugzilla.novell.com/show_bug.cgi?id=742358
https://bugzilla.novell.com/show_bug.cgi?id=743209
https://bugzilla.novell.com/show_bug.cgi?id=743619
https://bugzilla.novell.com/show_bug.cgi?id=744163
https://bugzilla.novell.com/show_bug.cgi?id=744658
https://bugzilla.novell.com/show_bug.cgi?id=745422
https://bugzilla.novell.com/show_bug.cgi?id=745699
https://bugzilla.novell.com/show_bug.cgi?id=745832
https://bugzilla.novell.com/show_bug.cgi?id=745929
https://bugzilla.novell.com/show_bug.cgi?id=746980
https://bugzilla.novell.com/show_bug.cgi?id=747028
https://bugzilla.novell.com/show_bug.cgi?id=747430
https://bugzilla.novell.com/show_bug.cgi?id=747445
https://bugzilla.novell.com/show_bug.cgi?id=748112
https://bugzilla.novell.com/show_bug.cgi?id=748279
https://bugzilla.novell.com/show_bug.cgi?id=748812
https://bugzilla.novell.com/show_bug.cgi?id=749342
https://bugzilla.novell.com/show_bug.cgi?id=749569
https://bugzilla.novell.com/show_bug.cgi?id=749886
https://bugzilla.novell.com/show_bug.cgi?id=750079
https://bugzilla.novell.com/show_bug.cgi?id=750171
https://bugzilla.novell.com/show_bug.cgi?id=751322
https://bugzilla.novell.com/show_bug.cgi?id=751844
https://bugzilla.novell.com/show_bug.cgi?id=751880
https://bugzilla.novell.com/show_bug.cgi?id=752491
https://bugzilla.novell.com/show_bug.cgi?id=752634
https://bugzilla.novell.com/show_bug.cgi?id=752972
https://bugzilla.novell.com/show_bug.cgi?id=755178
https://bugzilla.novell.com/show_bug.cgi?id=755537
https://bugzilla.novell.com/show_bug.cgi?id=756448
https://bugzilla.novell.com/show_bug.cgi?id=756840
https://bugzilla.novell.com/show_bug.cgi?id=757917
https://bugzilla.novell.com/show_bug.cgi?id=758532
https://bugzilla.novell.com/show_bug.cgi?id=758813
https://bugzilla.novell.com/show_bug.cgi?id=759544
http://support.novell.com/security/cve/CVE-2011-1083.html
http://support.novell.com/security/cve/CVE-2011-4086.html
http://support.novell.com/security/cve/CVE-2011-4622.html
http://support.novell.com/security/cve/CVE-2012-0045.html
http://support.novell.com/security/cve/CVE-2012-0879.html
http://support.novell.com/security/cve/CVE-2012-1090.html
Severity: High
ID: 64173
File Name: suse_11_kernel-120428.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/25/2013
Updated: 1/19/2021
Dependencies: 12634
Risk Factor: High
VPR Score: 5.9
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-trace, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-trace, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Patch Publication Date: 4/28/2012
CVE: CVE-2011-1083, CVE-2011-4086, CVE-2011-4622, CVE-2012-0045, CVE-2012-0879, CVE-2012-1090, CVE-2012-1097, CVE-2012-2133