Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 6.7
http://www.nessus.org/u?1c6953c2
http://support.novell.com/security/cve/CVE-2009-5029.html
http://support.novell.com/security/cve/CVE-2010-4756.html
http://support.novell.com/security/cve/CVE-2011-1089.html
http://support.novell.com/security/cve/CVE-2012-0864.html
http://support.novell.com/security/cve/CVE-2012-3480.html
http://support.novell.com/security/cve/CVE-2013-1914.html
https://bugzilla.novell.com/661460
https://bugzilla.novell.com/676178
https://bugzilla.novell.com/691365
https://bugzilla.novell.com/732110
https://bugzilla.novell.com/735850
https://bugzilla.novell.com/743689
https://bugzilla.novell.com/747768
https://bugzilla.novell.com/753756
https://bugzilla.novell.com/760216
https://bugzilla.novell.com/770891
https://bugzilla.novell.com/774467
https://bugzilla.novell.com/775690
https://bugzilla.novell.com/783196
https://bugzilla.novell.com/796982
https://bugzilla.novell.com/805899
https://bugzilla.novell.com/813121
https://bugzilla.novell.com/818630
Severity: Medium
ID: 83597
File Name: suse_SU-2013-1287-1.nasl
Version: 2.6
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/20/2015
Updated: 1/19/2021
Dependencies: ssh_get_info.nasl
Risk Factor: Medium
VPR Score: 6.7
Base Score: 6.8
Temporal Score: 5.3
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal Vector: E:POC/RL:OF/RC:C
CPE: p-cpe:/a:novell:suse_linux:glibc, p-cpe:/a:novell:suse_linux:glibc-devel, p-cpe:/a:novell:suse_linux:glibc-html, p-cpe:/a:novell:suse_linux:glibc-i18ndata, p-cpe:/a:novell:suse_linux:glibc-info, p-cpe:/a:novell:suse_linux:glibc-locale, p-cpe:/a:novell:suse_linux:glibc-profile, p-cpe:/a:novell:suse_linux:nscd, cpe:/o:novell:suse_linux:10
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/1/2013
CVE: CVE-2009-5029, CVE-2010-4756, CVE-2011-1089, CVE-2012-0864, CVE-2012-3480, CVE-2013-1914