Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 8.9
https://bugzilla.suse.com/show_bug.cgi?id=798406
https://bugzilla.suse.com/show_bug.cgi?id=821931
https://bugzilla.suse.com/show_bug.cgi?id=860593
https://bugzilla.suse.com/show_bug.cgi?id=879878
https://bugzilla.suse.com/show_bug.cgi?id=891087
https://bugzilla.suse.com/show_bug.cgi?id=897995
https://bugzilla.suse.com/show_bug.cgi?id=898693
https://bugzilla.suse.com/show_bug.cgi?id=900881
https://bugzilla.suse.com/show_bug.cgi?id=904671
https://bugzilla.suse.com/show_bug.cgi?id=908870
https://bugzilla.suse.com/show_bug.cgi?id=909477
https://bugzilla.suse.com/show_bug.cgi?id=912916
https://bugzilla.suse.com/show_bug.cgi?id=914742
https://bugzilla.suse.com/show_bug.cgi?id=915200
https://bugzilla.suse.com/show_bug.cgi?id=915517
https://bugzilla.suse.com/show_bug.cgi?id=915577
https://bugzilla.suse.com/show_bug.cgi?id=916010
https://bugzilla.suse.com/show_bug.cgi?id=917093
https://bugzilla.suse.com/show_bug.cgi?id=917830
https://bugzilla.suse.com/show_bug.cgi?id=918333
https://bugzilla.suse.com/show_bug.cgi?id=919007
https://bugzilla.suse.com/show_bug.cgi?id=919018
https://bugzilla.suse.com/show_bug.cgi?id=919463
https://bugzilla.suse.com/show_bug.cgi?id=921769
https://bugzilla.suse.com/show_bug.cgi?id=922583
https://bugzilla.suse.com/show_bug.cgi?id=923245
https://bugzilla.suse.com/show_bug.cgi?id=926240
https://bugzilla.suse.com/show_bug.cgi?id=927257
https://bugzilla.suse.com/show_bug.cgi?id=928801
https://bugzilla.suse.com/show_bug.cgi?id=929148
https://bugzilla.suse.com/show_bug.cgi?id=929283
https://bugzilla.suse.com/show_bug.cgi?id=929360
https://bugzilla.suse.com/show_bug.cgi?id=929525
https://bugzilla.suse.com/show_bug.cgi?id=930284
https://bugzilla.suse.com/show_bug.cgi?id=930934
https://bugzilla.suse.com/show_bug.cgi?id=931474
https://bugzilla.suse.com/show_bug.cgi?id=933429
https://bugzilla.suse.com/show_bug.cgi?id=935705
https://bugzilla.suse.com/show_bug.cgi?id=936831
https://bugzilla.suse.com/show_bug.cgi?id=937032
https://bugzilla.suse.com/show_bug.cgi?id=937986
https://bugzilla.suse.com/show_bug.cgi?id=940338
https://bugzilla.suse.com/show_bug.cgi?id=940398
https://www.suse.com/security/cve/CVE-2014-8086/
https://www.suse.com/security/cve/CVE-2014-8159/
https://www.suse.com/security/cve/CVE-2014-9683/
https://www.suse.com/security/cve/CVE-2015-0777/
https://www.suse.com/security/cve/CVE-2015-1420/
https://www.suse.com/security/cve/CVE-2015-1421/
https://www.suse.com/security/cve/CVE-2015-1805/
https://www.suse.com/security/cve/CVE-2015-2041/
https://www.suse.com/security/cve/CVE-2015-2042/
https://www.suse.com/security/cve/CVE-2015-2150/
https://www.suse.com/security/cve/CVE-2015-2830/
https://www.suse.com/security/cve/CVE-2015-2922/
https://www.suse.com/security/cve/CVE-2015-3331/
https://www.suse.com/security/cve/CVE-2015-3636/
https://www.suse.com/security/cve/CVE-2015-4700/
https://www.suse.com/security/cve/CVE-2015-5364/
https://www.suse.com/security/cve/CVE-2015-5366/
Severity: Critical
ID: 85764
File Name: suse_SU-2015-1478-1.nasl
Version: 2.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 9/3/2015
Updated: 1/19/2021
Dependencies: 12634
Risk Factor: Critical
VPR Score: 8.9
Base Score: 10
Temporal Score: 8.7
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
Base Score: 4.7
Temporal Score: 4.5
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/21/2015
Vulnerability Publication Date: 10/13/2014
CVE: CVE-2014-8086, CVE-2014-8159, CVE-2014-9683, CVE-2015-0777, CVE-2015-1420, CVE-2015-1421, CVE-2015-1805, CVE-2015-2041, CVE-2015-2042, CVE-2015-2150, CVE-2015-2830, CVE-2015-2922, CVE-2015-3331, CVE-2015-3636, CVE-2015-4700, CVE-2015-5364, CVE-2015-5366, CVE-2015-5707
BID: 70376, 72356, 72357, 72643, 72729, 72730, 73014, 73060, 73699, 73921, 74235, 74315, 74450, 74951, 75356, 75510