Vulnerabilities > CVE-2018-3287 - Unspecified vulnerability in Oracle VM Virtualbox

047910
CVSS 8.6 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
oracle
nessus

Summary

Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).

Vulnerable Configurations

Part Description Count
Application
Oracle
186

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-863.NASL
    descriptionThis update for VirtualBox 5.2.20 fixes security issues and bugs. A number of vulnerabilities were fixed a affecting multiple components of VirtualBox bsc#1112097: CVE-2018-0732, CVE-2018-2909, CVE-2018-3287, CVE-2018-3288, CVE-2018-3289, CVE-2018-3290, CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294, CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, and CVE-2018-3298. This update also contains various bug fixes in the 5.2.20 release : - VMM: fixed task switches triggered by INTn instruction - Storage: fixed connecting to certain iSCSI targets - Storage: fixed handling of flush requests when configured to be ignored when the host I/O cache is used - Drag and drop fixes - Video recording: fixed starting video recording on VM power up - Various fixes to Linux Additions
    last seen2020-05-31
    modified2019-03-27
    plugin id123360
    published2019-03-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123360
    titleopenSUSE Security Update : VirtualBox (openSUSE-2019-863)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-863.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123360);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/26");
    
      script_cve_id("CVE-2018-0732", "CVE-2018-2909", "CVE-2018-3287", "CVE-2018-3288", "CVE-2018-3289", "CVE-2018-3290", "CVE-2018-3291", "CVE-2018-3292", "CVE-2018-3293", "CVE-2018-3294", "CVE-2018-3295", "CVE-2018-3296", "CVE-2018-3297", "CVE-2018-3298");
    
      script_name(english:"openSUSE Security Update : VirtualBox (openSUSE-2019-863)");
      script_summary(english:"Check for the openSUSE-2019-863 patch");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "This update for VirtualBox 5.2.20 fixes security issues and bugs.
    
    A number of vulnerabilities were fixed a affecting multiple components
    of VirtualBox bsc#1112097: CVE-2018-0732, CVE-2018-2909,
    CVE-2018-3287, CVE-2018-3288, CVE-2018-3289, CVE-2018-3290,
    CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294,
    CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, and CVE-2018-3298. 
    
    This update also contains various bug fixes in the 5.2.20 release :
    
      - VMM: fixed task switches triggered by INTn instruction
    
      - Storage: fixed connecting to certain iSCSI targets
    
      - Storage: fixed handling of flush requests when
        configured to be ignored when the host I/O cache is used
    
      - Drag and drop fixes
    
      - Video recording: fixed starting video recording on VM
        power up
    
      - Various fixes to Linux Additions"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1112097"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Update the affected VirtualBox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-vnc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/06/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/03/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/27");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"python3-virtualbox-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-virtualbox-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-debugsource-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-devel-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-desktop-icons-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-kmp-default-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-kmp-default-debuginfo-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-source-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-tools-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-tools-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-x11-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-x11-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-kmp-default-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-kmp-default-debuginfo-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-source-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-qt-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-qt-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-vnc-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-websrv-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-websrv-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python3-virtualbox / python3-virtualbox-debuginfo / virtualbox / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1330.NASL
    descriptionThis update for VirtualBox 5.2.20 fixes security issues and bugs. A number of vulnerabilities were fixed a affecting multiple components of VirtualBox bsc#1112097: CVE-2018-0732, CVE-2018-2909, CVE-2018-3287, CVE-2018-3288, CVE-2018-3289, CVE-2018-3290, CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294, CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, and CVE-2018-3298. This update also contains various bug fixes in the 5.2.20 release : - VMM: fixed task switches triggered by INTn instruction - Storage: fixed connecting to certain iSCSI targets - Storage: fixed handling of flush requests when configured to be ignored when the host I/O cache is used - Drag and drop fixes - Video recording: fixed starting video recording on VM power up - Various fixes to Linux Additions
    last seen2020-06-05
    modified2018-10-31
    plugin id118562
    published2018-10-31
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118562
    titleopenSUSE Security Update : VirtualBox (openSUSE-2018-1330)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2018-1330.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(118562);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-0732", "CVE-2018-2909", "CVE-2018-3287", "CVE-2018-3288", "CVE-2018-3289", "CVE-2018-3290", "CVE-2018-3291", "CVE-2018-3292", "CVE-2018-3293", "CVE-2018-3294", "CVE-2018-3295", "CVE-2018-3296", "CVE-2018-3297", "CVE-2018-3298");
    
      script_name(english:"openSUSE Security Update : VirtualBox (openSUSE-2018-1330)");
      script_summary(english:"Check for the openSUSE-2018-1330 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for VirtualBox 5.2.20 fixes security issues and bugs.
    
    A number of vulnerabilities were fixed a affecting multiple components
    of VirtualBox bsc#1112097: CVE-2018-0732, CVE-2018-2909,
    CVE-2018-3287, CVE-2018-3288, CVE-2018-3289, CVE-2018-3290,
    CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294,
    CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, and CVE-2018-3298. 
    
    This update also contains various bug fixes in the 5.2.20 release :
    
      - VMM: fixed task switches triggered by INTn instruction
    
      - Storage: fixed connecting to certain iSCSI targets
    
      - Storage: fixed handling of flush requests when
        configured to be ignored when the host I/O cache is used
    
      - Drag and drop fixes
    
      - Video recording: fixed starting video recording on VM
        power up
    
      - Various fixes to Linux Additions"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1112097"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected VirtualBox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-host-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-vnc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/10/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/31");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0|SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0 / 42.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"python3-virtualbox-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-virtualbox-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-debugsource-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-devel-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-desktop-icons-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-kmp-default-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-kmp-default-debuginfo-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-source-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-tools-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-tools-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-x11-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-guest-x11-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-kmp-default-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-kmp-default-debuginfo-5.2.20_k4.12.14_lp150.12.22-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-host-source-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-qt-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-qt-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-vnc-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-websrv-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"virtualbox-websrv-debuginfo-5.2.20-lp150.4.20.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-virtualbox-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-virtualbox-debuginfo-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-debuginfo-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-debugsource-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-devel-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-desktop-icons-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-kmp-default-5.2.20_k4.4.159_73-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-kmp-default-debuginfo-5.2.20_k4.4.159_73-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-source-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-tools-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-tools-debuginfo-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-x11-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-guest-x11-debuginfo-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-host-kmp-default-5.2.20_k4.4.159_73-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-host-kmp-default-debuginfo-5.2.20_k4.4.159_73-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-host-source-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-qt-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-qt-debuginfo-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-vnc-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-websrv-5.2.20-60.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"virtualbox-websrv-debuginfo-5.2.20-60.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python3-virtualbox / python3-virtualbox-debuginfo / virtualbox / etc");
    }
    
  • NASL familyMisc.
    NASL idVIRTUALBOX_5_2_20.NASL
    descriptionThe version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.20. It is, therefore, affected by multiple vulnerabilities as noted in the October 2018 Critical Patch Update advisory : - An unspecified vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization in the Core subcomponent could allow an unauthenticated, remote attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. (CVE-2018-2909, CVE-2018-3287, CVE-2018-3288, CVE-2018-3289, CVE-2018-3290, CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294, CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, CVE-2018-3298) - An unspecified vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization in the OpenSSL subcomponent could allow an unauthenticated, remote attacker with network access via TLS to compromise Oracle VM VirtualBox. (CVE-2018-0732) Please consult the CVRF details for the applicable CVEs for additional information. Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id118204
    published2018-10-18
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118204
    titleOracle VM VirtualBox < 5.2.20 Multiple Vulnerabilities (Oct 2018 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(118204);
      script_version("1.7");
      script_cvs_date("Date: 2019/11/04");
    
      script_cve_id(
        "CVE-2018-0732",
        "CVE-2018-2909",
        "CVE-2018-3287",
        "CVE-2018-3288",
        "CVE-2018-3289",
        "CVE-2018-3290",
        "CVE-2018-3291",
        "CVE-2018-3292",
        "CVE-2018-3293",
        "CVE-2018-3294",
        "CVE-2018-3295",
        "CVE-2018-3296",
        "CVE-2018-3297",
        "CVE-2018-3298"
      );
      script_bugtraq_id(104442);
    
      script_name(english:"Oracle VM VirtualBox < 5.2.20 Multiple Vulnerabilities (Oct 2018 CPU)");
      script_summary(english:"Performs a version check on VirtualBox.exe");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle VM VirtualBox running on the remote host is
    5.2.x prior to 5.2.20. It is, therefore, affected by multiple
    vulnerabilities as noted in the October 2018 Critical Patch Update
    advisory : 
    
      - An unspecified vulnerability in the Oracle VM
        VirtualBox component of Oracle Virtualization in the
        Core subcomponent could allow an unauthenticated,
        remote attacker with logon to the infrastructure where
        Oracle VM VirtualBox executes to compromise Oracle VM
        VirtualBox. (CVE-2018-2909, CVE-2018-3287,
        CVE-2018-3288, CVE-2018-3289, CVE-2018-3290,
        CVE-2018-3291, CVE-2018-3292, CVE-2018-3293,
        CVE-2018-3294, CVE-2018-3295, CVE-2018-3296,
        CVE-2018-3297, CVE-2018-3298)
    
      - An unspecified vulnerability in the Oracle VM
        VirtualBox component of Oracle Virtualization in the
        OpenSSL subcomponent could allow an unauthenticated,
        remote attacker with network access via TLS to
        compromise Oracle VM VirtualBox. (CVE-2018-0732)
    
    Please consult the CVRF details for the applicable CVEs for
    additional information.
    
    Nessus has not tested for these issues but has instead
    relied only on the application's self-reported version number.");
      # https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixOVIR
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?aca0e0f6");
      script_set_attribute(attribute:"see_also", value:"https://www.virtualbox.org/wiki/Changelog");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Oracle VM VirtualBox version 5.2.20 or later as
    referenced in the October 2018 Oracle Critical Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3294");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"agent", value:"all");
    
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/10/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/10/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/18");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:vm_virtualbox");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("virtualbox_installed.nasl", "macosx_virtualbox_installed.nbin");
      script_require_ports("installed_sw/Oracle VM VirtualBox", "installed_sw/VirtualBox");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    app  = NULL;
    apps = make_list('Oracle VM VirtualBox', 'VirtualBox');
    
    foreach app (apps)
    {
      if (get_install_count(app_name:app)) break;
      else app = NULL;
    }
    
    if (isnull(app)) audit(AUDIT_NOT_INST, 'Oracle VM VirtualBox');
    
    install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
    
    ver  = install['version'];
    path = install['path'];
    
    # Affected :
    if ( ver_compare(ver:ver, fix:'5.2.20', strict:FALSE) < 0) fix = '5.2.20';
    else audit(AUDIT_INST_PATH_NOT_VULN, app, ver, path);
    
    port = 0;
    if (app == 'Oracle VM VirtualBox')
    {
      port = get_kb_item("SMB/transport");
      if (!port) port = 445;
    }
    
    report =
      '\n  Path              : ' + path +
      '\n  Installed version : ' + ver +
      '\n  Fixed version     : ' + fix +
      '\n';
    security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
    exit(0);