Vulnerability CVE-2018-3294


Published: 2018-10-16   Modified: 2018-10-17

Description:
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

Type:

CWE-284

(Improper Access Control)

Vendor: Oracle
Product: Vm virtualbox 
Version:
5.1.8
5.1.6
5.1.4
5.1.2
5.1.18
5.1.14
5.1.10
5.1.0
5.0.36
5.0.32
5.0.26
5.0.24
5.0.20
5.0.18
5.0.16
5.0.14
5.0.13
5.0.12
5.0.10
4.3.8
4.3.6
4.3.4
4.3.36
4.3.35
4.3.34
4.3.29
4.3.2
4.3.18
4.3.14
4.3.12
4.3.10
4.3.0
4.2.8
4.2.6
4.2.4
4.2.36
4.2.34
4.2.31
4.2.26
4.2.24
4.2.22
4.2.20
4.2.2
4.2.18
4.2.16
4.2.14
4.2.12
4.2.10
4.2.0
4.1.8
4.1.6
4.1.44
4.1.42
4.1.4
4.1.39
4.1.34
4.1.32
4.1.30
4.1.28
4.1.26
4.1.24
4.1.22
4.1.20
4.1.2
4.1.18
4.1.16
4.1.14
4.1.12
4.1.10
4.1.0
4.0.8
4.0.6
4.0.4
4.0.36
4.0.34
4.0.31
4.0.26
4.0.24
4.0.22
4.0.20
4.0.2
4.0.18
4.0.16
4.0.14
4.0.12
4.0.10
4.0.0
4.0
3.2.8
3.2.6
3.2.4
3.2.24
3.2.22
3.2.20
3.2.2
3.2.18
3.2.16
3.2.14
3.2.12
3.2.10
See more versions on NVD

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105624
http://www.securitytracker.com/id/1041887

Related CVE
CVE-2019-2695
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple...
CVE-2019-2694
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple...
CVE-2019-2693
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple...
CVE-2019-2692
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructur...
CVE-2019-2691
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m...
CVE-2019-2689
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multipl...
CVE-2019-2688
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multipl...
CVE-2019-2687
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multipl...

Copyright 2019, cxsecurity.com

 

Back to Top