Vulnerabilities > CVE-2015-4896
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-688.NASL description VirtualBox was updated to 4.3.32 to fix security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-4813: Windows guests with guest additions installed could cause a hang or crash of VirtualBox. - CVE-2015-4896: Remote unauthenticated users could cause crash (DoS) via the network when the Remote Display feature (RDP) is enabled. last seen 2020-06-05 modified 2015-11-02 plugin id 86694 published 2015-11-02 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/86694 title openSUSE Security Update : VirtualBox (openSUSE-2015-688) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2015-688. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(86694); script_version("2.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2015-4813", "CVE-2015-4896"); script_name(english:"openSUSE Security Update : VirtualBox (openSUSE-2015-688)"); script_summary(english:"Check for the openSUSE-2015-688 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "VirtualBox was updated to 4.3.32 to fix security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-4813: Windows guests with guest additions installed could cause a hang or crash of VirtualBox. - CVE-2015-4896: Remote unauthenticated users could cause crash (DoS) via the network when the Remote Display feature (RDP) is enabled." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=951432" ); script_set_attribute( attribute:"solution", value:"Update the affected VirtualBox packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2"); script_set_attribute(attribute:"patch_publication_date", value:"2015/10/31"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/02"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE13.2", reference:"python-virtualbox-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"python-virtualbox-debuginfo-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-debuginfo-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-debugsource-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-devel-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-desktop-icons-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-default-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-default-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-desktop-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-desktop-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-pae-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-pae-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-tools-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-tools-debuginfo-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-x11-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-x11-debuginfo-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-default-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-default-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-desktop-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-desktop-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-pae-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-pae-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-source-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-qt-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-qt-debuginfo-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-websrv-4.3.32-32.2") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-websrv-debuginfo-4.3.32-32.2") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-virtualbox / python-virtualbox-debuginfo / virtualbox / etc"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-839.NASL description The virtualbox package was updated to version 4.2.36 to fix the following security and non security issues : - Version bump tp 4.2.36 (released 2015-11-11 by Oracle) - several fixes - Oracle is not more specific - Version bump to 4.2.34 (released 2015-10-20 by Oracle) (bsc#951432) - CVE-2015-4813: Only Windows guests are impacted. Windows guests without VirtualBox Guest Additions installed are not affected. - CVE-2015-4896: Only VMs with Remote Display feature (RDP) enabled are impacted by CVE-2015-4896. - several fixes - Linux hosts: Linux 4.2 fix - Linux hosts: Linux 4.3 compile fixes - Windows hosts: hardening fixes - Linux Additions: Linux 4.2 fixes (bug #14227) last seen 2020-06-05 modified 2015-12-01 plugin id 87116 published 2015-12-01 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/87116 title openSUSE Security Update : virtualbox (openSUSE-2015-839) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2015-839. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(87116); script_version("2.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2015-4813", "CVE-2015-4896"); script_name(english:"openSUSE Security Update : virtualbox (openSUSE-2015-839)"); script_summary(english:"Check for the openSUSE-2015-839 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "The virtualbox package was updated to version 4.2.36 to fix the following security and non security issues : - Version bump tp 4.2.36 (released 2015-11-11 by Oracle) - several fixes - Oracle is not more specific - Version bump to 4.2.34 (released 2015-10-20 by Oracle) (bsc#951432) - CVE-2015-4813: Only Windows guests are impacted. Windows guests without VirtualBox Guest Additions installed are not affected. - CVE-2015-4896: Only VMs with Remote Display feature (RDP) enabled are impacted by CVE-2015-4896. - several fixes - Linux hosts: Linux 4.2 fix - Linux hosts: Linux 4.3 compile fixes - Windows hosts: hardening fixes - Linux Additions: Linux 4.2 fixes (bug #14227)" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=951432" ); script_set_attribute( attribute:"solution", value:"Update the affected virtualbox packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1"); script_set_attribute(attribute:"patch_publication_date", value:"2015/11/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE13.1", reference:"python-virtualbox-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"python-virtualbox-debuginfo-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-debuginfo-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-debugsource-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-devel-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-default-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-desktop-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-pae-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-tools-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-tools-debuginfo-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-x11-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-x11-debuginfo-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-default-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-default-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-desktop-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-pae-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-source-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-qt-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-qt-debuginfo-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-websrv-4.2.36-2.52.2") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-websrv-debuginfo-4.2.36-2.52.2") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-virtualbox / python-virtualbox-debuginfo / virtualbox / etc"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-3384.NASL description Two vulnerabilities have been discovered in VirtualBox, an x86 virtualisation solution. last seen 2020-06-01 modified 2020-06-02 plugin id 86678 published 2015-11-02 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86678 title Debian DSA-3384-1 : virtualbox - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-3384. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(86678); script_version("2.7"); script_cvs_date("Date: 2018/11/10 11:49:37"); script_cve_id("CVE-2015-4813", "CVE-2015-4896"); script_xref(name:"DSA", value:"3384"); script_name(english:"Debian DSA-3384-1 : virtualbox - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Two vulnerabilities have been discovered in VirtualBox, an x86 virtualisation solution." ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/wheezy/virtualbox" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/jessie/virtualbox" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2015/dsa-3384" ); script_set_attribute( attribute:"solution", value: "Upgrade the virtualbox packages. For the oldstable distribution (wheezy), these problems have been fixed in version 4.1.42-dfsg-1+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 4.3.32-dfsg-1+deb8u2." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:virtualbox"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0"); script_set_attribute(attribute:"patch_publication_date", value:"2015/10/29"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/02"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"7.0", prefix:"virtualbox", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-dbg", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-fuse", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-guest-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-guest-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-guest-utils", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-guest-x11", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-dbg", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-fuse", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-utils", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-x11", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-qt", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-ose-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-qt", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"7.0", prefix:"virtualbox-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-dbg", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-dkms", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-guest-dkms", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-guest-source", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-guest-utils", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-guest-x11", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-qt", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (deb_check(release:"8.0", prefix:"virtualbox-source", reference:"4.3.32-dfsg-1+deb8u2")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_7D40EDD1901E11E6A59014DAE9D210B8.NASL description Oracle reports reports : Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local users to affect availability via unknown vectors related to Core. Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core. last seen 2020-06-01 modified 2020-06-02 plugin id 93986 published 2016-10-12 reporter This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/93986 title FreeBSD : VirtualBox -- undisclosed vulnerabilities (7d40edd1-901e-11e6-a590-14dae9d210b8) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the FreeBSD VuXML database : # # Copyright 2003-2018 Jacques Vidrine and contributors # # Redistribution and use in source (VuXML) and 'compiled' forms (SGML, # HTML, PDF, PostScript, RTF and so forth) with or without modification, # are permitted provided that the following conditions are met: # 1. Redistributions of source code (VuXML) must retain the above # copyright notice, this list of conditions and the following # disclaimer as the first lines of this file unmodified. # 2. Redistributions in compiled form (transformed to other DTDs, # published online in any format, converted to PDF, PostScript, # RTF and other formats) must reproduce the above copyright # notice, this list of conditions and the following disclaimer # in the documentation and/or other materials provided with the # distribution. # # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # include("compat.inc"); if (description) { script_id(93986); script_version("2.2"); script_cvs_date("Date: 2018/11/10 11:49:45"); script_cve_id("CVE-2015-4813", "CVE-2015-4896"); script_name(english:"FreeBSD : VirtualBox -- undisclosed vulnerabilities (7d40edd1-901e-11e6-a590-14dae9d210b8)"); script_summary(english:"Checks for updated packages in pkg_info output"); script_set_attribute( attribute:"synopsis", value: "The remote FreeBSD host is missing one or more security-related updates." ); script_set_attribute( attribute:"description", value: "Oracle reports reports : Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local users to affect availability via unknown vectors related to Core. Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core." ); # http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?75a4a4fb" ); script_set_attribute( attribute:"see_also", value:"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204406" ); # https://vuxml.freebsd.org/freebsd/7d40edd1-901e-11e6-a590-14dae9d210b8.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?409d2692" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:virtualbox-ose"); script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/01"); script_set_attribute(attribute:"patch_publication_date", value:"2016/10/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"FreeBSD Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info"); exit(0); } include("audit.inc"); include("freebsd_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD"); if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=5.0<5.0.8")) flag++; if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.3<4.3.32")) flag++; if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.2<4.2.34")) flag++; if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.1<4.1.42")) flag++; if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.0<4.0.34")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Misc. NASL id VIRTUALBOX_5_0_8.NASL description The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, or 5.0.8. It is, therefore, affected by multiple unspecified flaws in the Core subcomponent. A local attacker can exploit these to cause a denial of service. last seen 2020-06-01 modified 2020-06-02 plugin id 86568 published 2015-10-23 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86568 title Oracle VM VirtualBox < 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 Multiple Core DoS (October 2015 CPU) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(86568); script_version("1.10"); script_cvs_date("Date: 2019/03/27 13:17:50"); script_cve_id("CVE-2015-4813", "CVE-2015-4896"); script_name(english:"Oracle VM VirtualBox < 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 Multiple Core DoS (October 2015 CPU)"); script_summary(english:"Performs a version check on VirtualBox.exe."); script_set_attribute(attribute:"synopsis", value: "An application installed on the remote host is affected by multiple unspecified denial of service vulnerabilities."); script_set_attribute(attribute:"description", value: "The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, or 5.0.8. It is, therefore, affected by multiple unspecified flaws in the Core subcomponent. A local attacker can exploit these to cause a denial of service."); # http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?75a4a4fb"); script_set_attribute(attribute:"see_also", value:"https://www.virtualbox.org/wiki/Changelog"); script_set_attribute(attribute:"solution", value: "Upgrade to Oracle VM VirtualBox version 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 or later as referenced in the October 2015 Oracle Critical Patch Update advisory."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-4896"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/20"); script_set_attribute(attribute:"patch_publication_date", value:"2015/10/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/23"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"agent", value:"all"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:vm_virtualbox"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("virtualbox_installed.nasl", "macosx_virtualbox_installed.nbin"); script_require_ports("installed_sw/Oracle VM VirtualBox", "installed_sw/VirtualBox"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("install_func.inc"); app = NULL; apps = make_list('Oracle VM VirtualBox', 'VirtualBox'); foreach app (apps) { if (get_install_count(app_name:app)) break; else app = NULL; } if (isnull(app)) audit(AUDIT_NOT_INST, 'Oracle VM VirtualBox'); install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE); ver = install['version']; path = install['path']; # Note int(null) returns '0' ver_fields = split(ver, sep:'.', keep:FALSE); major = int(ver_fields[0]); minor = int(ver_fields[1]); rev = int(ver_fields[2]); fix = ''; # Affected : # 4.0.x < 4.0.34 # 4.1.x < 4.1.42 # 4.2.x < 4.2.34 # 4.3.x < 4.3.32 # 5.0.x < 5.0.8 if (major == 4 && minor == 0 && rev < 34) fix = '4.0.34'; else if (major == 4 && minor == 1 && rev < 42) fix = '4.1.42'; else if (major == 4 && minor == 2 && rev < 34) fix = '4.2.34'; else if (major == 4 && minor == 3 && rev < 32) fix = '4.3.32'; else if (major == 5 && minor == 0 && rev < 8) fix = '5.0.8'; else audit(AUDIT_INST_PATH_NOT_VULN, app, ver, path); port = 0; if (app == 'Oracle VM VirtualBox') { port = get_kb_item("SMB/transport"); if (!port) port = 445; } if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + ver + '\n Fixed version : ' + fix + '\n'; security_warning(port:port, extra:report); } else security_warning(port);
References
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00172.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00172.html
- http://www.debian.org/security/2015/dsa-3384
- http://www.debian.org/security/2015/dsa-3384
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/77198
- http://www.securityfocus.com/bid/77198
- http://www.securitytracker.com/id/1033880
- http://www.securitytracker.com/id/1033880