Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 8.9
https://bugzilla.novell.com/show_bug.cgi?id=804950
https://bugzilla.novell.com/show_bug.cgi?id=805226
https://bugzilla.novell.com/show_bug.cgi?id=808358
https://bugzilla.novell.com/show_bug.cgi?id=811746
https://bugzilla.novell.com/show_bug.cgi?id=825006
https://bugzilla.novell.com/show_bug.cgi?id=831836
https://bugzilla.novell.com/show_bug.cgi?id=838024
https://bugzilla.novell.com/show_bug.cgi?id=840226
https://bugzilla.novell.com/show_bug.cgi?id=840656
https://bugzilla.novell.com/show_bug.cgi?id=844513
https://bugzilla.novell.com/show_bug.cgi?id=848079
https://bugzilla.novell.com/show_bug.cgi?id=848255
https://bugzilla.novell.com/show_bug.cgi?id=849021
https://bugzilla.novell.com/show_bug.cgi?id=849023
https://bugzilla.novell.com/show_bug.cgi?id=849029
https://bugzilla.novell.com/show_bug.cgi?id=849034
https://bugzilla.novell.com/show_bug.cgi?id=849362
https://bugzilla.novell.com/show_bug.cgi?id=852373
https://bugzilla.novell.com/show_bug.cgi?id=852558
https://bugzilla.novell.com/show_bug.cgi?id=852559
https://bugzilla.novell.com/show_bug.cgi?id=853050
https://bugzilla.novell.com/show_bug.cgi?id=853051
https://bugzilla.novell.com/show_bug.cgi?id=853052
https://bugzilla.novell.com/show_bug.cgi?id=853053
https://bugzilla.novell.com/show_bug.cgi?id=854173
https://bugzilla.novell.com/show_bug.cgi?id=854634
https://bugzilla.novell.com/show_bug.cgi?id=854722
https://bugzilla.novell.com/show_bug.cgi?id=860993
https://lists.opensuse.org/opensuse-updates/2014-02/msg00021.html
Severity: High
ID: 75251
File Name: openSUSE-2014-113.nasl
Version: 1.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/13/2014
Updated: 1/19/2021
Dependencies: 12634
Risk Factor: High
VPR Score: 8.9
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-desktop-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-pae-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-trace-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:kernel-xen-devel-debuginfo, cpe:/o:novell:opensuse:12.3
Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/4/2014
CANVAS (CANVAS)
Core Impact
Metasploit (Linux Kernel recvmmsg Privilege Escalation)
CVE: CVE-2013-0343, CVE-2013-1792, CVE-2013-4348, CVE-2013-4511, CVE-2013-4513, CVE-2013-4514, CVE-2013-4515, CVE-2013-4587, CVE-2013-6367, CVE-2013-6368, CVE-2013-6376, CVE-2013-6378, CVE-2013-6380, CVE-2013-6431, CVE-2013-7027, CVE-2014-0038