Vulnerabilities > CVE-2015-4896 - Remote Security vulnerability in Oracle VM VirtualBox

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
oracle
debian
nessus

Summary

Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core. Per <a href="http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" rel="nofollow">LINK</a>: Only VMs with Remote Display feature (RDP) enabled are impacted by CVE-2015-4896.

Vulnerable Configurations

Part Description Count
Application
Oracle
74
OS
Debian
3

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-688.NASL
    descriptionVirtualBox was updated to 4.3.32 to fix security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-4813: Windows guests with guest additions installed could cause a hang or crash of VirtualBox. - CVE-2015-4896: Remote unauthenticated users could cause crash (DoS) via the network when the Remote Display feature (RDP) is enabled.
    last seen2020-06-05
    modified2015-11-02
    plugin id86694
    published2015-11-02
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86694
    titleopenSUSE Security Update : VirtualBox (openSUSE-2015-688)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-688.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86694);
      script_version("2.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-4813", "CVE-2015-4896");
    
      script_name(english:"openSUSE Security Update : VirtualBox (openSUSE-2015-688)");
      script_summary(english:"Check for the openSUSE-2015-688 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "VirtualBox was updated to 4.3.32 to fix security issues and bugs.
    
    The following vulnerabilities were fixed :
    
      - CVE-2015-4813: Windows guests with guest additions
        installed could cause a hang or crash of VirtualBox.
    
      - CVE-2015-4896: Remote unauthenticated users could cause
        crash (DoS) via the network when the Remote Display
        feature (RDP) is enabled."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=951432"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected VirtualBox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.2", reference:"python-virtualbox-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"python-virtualbox-debuginfo-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-debuginfo-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-debugsource-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-devel-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-desktop-icons-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-default-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-default-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-desktop-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-desktop-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-pae-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-kmp-pae-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-tools-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-tools-debuginfo-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-x11-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-guest-x11-debuginfo-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-default-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-default-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-desktop-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-desktop-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-pae-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-kmp-pae-debuginfo-4.3.32_k3.16.7_29-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-host-source-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-qt-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-qt-debuginfo-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-websrv-4.3.32-32.2") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"virtualbox-websrv-debuginfo-4.3.32-32.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-virtualbox / python-virtualbox-debuginfo / virtualbox / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-839.NASL
    descriptionThe virtualbox package was updated to version 4.2.36 to fix the following security and non security issues : - Version bump tp 4.2.36 (released 2015-11-11 by Oracle) - several fixes - Oracle is not more specific - Version bump to 4.2.34 (released 2015-10-20 by Oracle) (bsc#951432) - CVE-2015-4813: Only Windows guests are impacted. Windows guests without VirtualBox Guest Additions installed are not affected. - CVE-2015-4896: Only VMs with Remote Display feature (RDP) enabled are impacted by CVE-2015-4896. - several fixes - Linux hosts: Linux 4.2 fix - Linux hosts: Linux 4.3 compile fixes - Windows hosts: hardening fixes - Linux Additions: Linux 4.2 fixes (bug #14227)
    last seen2020-06-05
    modified2015-12-01
    plugin id87116
    published2015-12-01
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/87116
    titleopenSUSE Security Update : virtualbox (openSUSE-2015-839)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-839.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87116);
      script_version("2.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-4813", "CVE-2015-4896");
    
      script_name(english:"openSUSE Security Update : virtualbox (openSUSE-2015-839)");
      script_summary(english:"Check for the openSUSE-2015-839 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The virtualbox package was updated to version 4.2.36 to fix the
    following security and non security issues :
    
      - Version bump tp 4.2.36 (released 2015-11-11 by Oracle)
    
      - several fixes - Oracle is not more specific
    
      - Version bump to 4.2.34 (released 2015-10-20 by Oracle)
        (bsc#951432)
    
      - CVE-2015-4813: Only Windows guests are impacted. Windows
        guests without VirtualBox Guest Additions installed are
        not affected.
    
      - CVE-2015-4896: Only VMs with Remote Display feature
        (RDP) enabled are impacted by CVE-2015-4896.
    
      - several fixes
    
      - Linux hosts: Linux 4.2 fix
    
      - Linux hosts: Linux 4.3 compile fixes
    
      - Windows hosts: hardening fixes
    
      - Linux Additions: Linux 4.2 fixes (bug #14227)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=951432"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected virtualbox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/11/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"python-virtualbox-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"python-virtualbox-debuginfo-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-debuginfo-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-debugsource-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-devel-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-default-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-desktop-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-pae-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-tools-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-tools-debuginfo-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-x11-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-guest-x11-debuginfo-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-default-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-default-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-desktop-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-pae-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.11.10_29-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-host-source-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-qt-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-qt-debuginfo-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-websrv-4.2.36-2.52.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"virtualbox-websrv-debuginfo-4.2.36-2.52.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-virtualbox / python-virtualbox-debuginfo / virtualbox / etc");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3384.NASL
    descriptionTwo vulnerabilities have been discovered in VirtualBox, an x86 virtualisation solution.
    last seen2020-06-01
    modified2020-06-02
    plugin id86678
    published2015-11-02
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86678
    titleDebian DSA-3384-1 : virtualbox - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3384. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86678);
      script_version("2.7");
      script_cvs_date("Date: 2018/11/10 11:49:37");
    
      script_cve_id("CVE-2015-4813", "CVE-2015-4896");
      script_xref(name:"DSA", value:"3384");
    
      script_name(english:"Debian DSA-3384-1 : virtualbox - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Two vulnerabilities have been discovered in VirtualBox, an x86
    virtualisation solution."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/virtualbox"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/virtualbox"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2015/dsa-3384"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the virtualbox packages.
    
    For the oldstable distribution (wheezy), these problems have been
    fixed in version 4.1.42-dfsg-1+deb7u1.
    
    For the stable distribution (jessie), these problems have been fixed
    in version 4.3.32-dfsg-1+deb8u2."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:virtualbox");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"virtualbox", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-dbg", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-fuse", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-guest-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-guest-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-guest-utils", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-guest-x11", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-dbg", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-fuse", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-dkms", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-utils", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-guest-x11", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-qt", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-ose-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-qt", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"virtualbox-source", reference:"4.1.42-dfsg-1+deb7u1")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-dbg", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-dkms", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-guest-dkms", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-guest-source", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-guest-utils", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-guest-x11", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-qt", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    if (deb_check(release:"8.0", prefix:"virtualbox-source", reference:"4.3.32-dfsg-1+deb8u2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_7D40EDD1901E11E6A59014DAE9D210B8.NASL
    descriptionOracle reports reports : Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local users to affect availability via unknown vectors related to Core. Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core.
    last seen2020-06-01
    modified2020-06-02
    plugin id93986
    published2016-10-12
    reporterThis script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/93986
    titleFreeBSD : VirtualBox -- undisclosed vulnerabilities (7d40edd1-901e-11e6-a590-14dae9d210b8)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(93986);
      script_version("2.2");
      script_cvs_date("Date: 2018/11/10 11:49:45");
    
      script_cve_id("CVE-2015-4813", "CVE-2015-4896");
    
      script_name(english:"FreeBSD : VirtualBox -- undisclosed vulnerabilities (7d40edd1-901e-11e6-a590-14dae9d210b8)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Oracle reports reports :
    
    Unspecified vulnerability in the Oracle VM VirtualBox component in
    Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34,
    4.3.32, and 5.0.8, when using a Windows guest, allows local users to
    affect availability via unknown vectors related to Core.
    
    Unspecified vulnerability in the Oracle VM VirtualBox component in
    Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34,
    4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP)
    enabled, allows remote attackers to affect availability via unknown
    vectors related to Core."
      );
      # http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?75a4a4fb"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204406"
      );
      # https://vuxml.freebsd.org/freebsd/7d40edd1-901e-11e6-a590-14dae9d210b8.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?409d2692"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:virtualbox-ose");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2016/10/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=5.0<5.0.8")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.3<4.3.32")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.2<4.2.34")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.1<4.1.42")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"virtualbox-ose>=4.0<4.0.34")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMisc.
    NASL idVIRTUALBOX_5_0_8.NASL
    descriptionThe Oracle VM VirtualBox application installed on the remote host is a version prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, or 5.0.8. It is, therefore, affected by multiple unspecified flaws in the Core subcomponent. A local attacker can exploit these to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86568
    published2015-10-23
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86568
    titleOracle VM VirtualBox < 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 Multiple Core DoS (October 2015 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    { 
      script_id(86568);
      script_version("1.10");
      script_cvs_date("Date: 2019/03/27 13:17:50");
    
      script_cve_id("CVE-2015-4813", "CVE-2015-4896");
    
      script_name(english:"Oracle VM VirtualBox < 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 Multiple Core DoS (October 2015 CPU)");
      script_summary(english:"Performs a version check on VirtualBox.exe.");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple
    unspecified denial of service vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The Oracle VM VirtualBox application installed on the remote host is a
    version prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, or 5.0.8. It is,
    therefore, affected by multiple unspecified flaws in the Core
    subcomponent. A local attacker can exploit these to cause a denial of
    service.");
      # http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?75a4a4fb");
      script_set_attribute(attribute:"see_also", value:"https://www.virtualbox.org/wiki/Changelog");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Oracle VM VirtualBox version 4.0.34 / 4.1.42 / 4.2.34 /
    4.3.32 / 5.0.8 or later as referenced in the October 2015 Oracle
    Critical Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-4896");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/23");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"agent", value:"all");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:vm_virtualbox");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("virtualbox_installed.nasl", "macosx_virtualbox_installed.nbin");
      script_require_ports("installed_sw/Oracle VM VirtualBox", "installed_sw/VirtualBox");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    app  = NULL;
    apps = make_list('Oracle VM VirtualBox', 'VirtualBox');
    
    foreach app (apps)
    {
      if (get_install_count(app_name:app)) break;
      else app = NULL;
    }
    
    if (isnull(app)) audit(AUDIT_NOT_INST, 'Oracle VM VirtualBox');
      
    install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
    
    ver  = install['version'];
    path = install['path'];
    
    # Note int(null) returns '0'
    ver_fields = split(ver, sep:'.', keep:FALSE);
    major = int(ver_fields[0]);
    minor = int(ver_fields[1]);
    rev   = int(ver_fields[2]);
    
    fix = '';
    
    # Affected :
    # 4.0.x < 4.0.34
    # 4.1.x < 4.1.42
    # 4.2.x < 4.2.34
    # 4.3.x < 4.3.32
    # 5.0.x < 5.0.8
    if      (major == 4 && minor == 0 && rev < 34) fix = '4.0.34';
    else if (major == 4 && minor == 1 && rev < 42) fix = '4.1.42';
    else if (major == 4 && minor == 2 && rev < 34) fix = '4.2.34';
    else if (major == 4 && minor == 3 && rev < 32) fix = '4.3.32';
    else if (major == 5 && minor == 0 && rev < 8)  fix = '5.0.8';
    else audit(AUDIT_INST_PATH_NOT_VULN, app, ver, path);
    
    port = 0;
    if (app == 'Oracle VM VirtualBox')
    {
      port = get_kb_item("SMB/transport");
      if (!port) port = 445;
    }
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Path              : ' + path +
        '\n  Installed version : ' + ver +
        '\n  Fixed version     : ' + fix +
        '\n';
      security_warning(port:port, extra:report);
    }
    else security_warning(port);