Vulnerability CVE-2018-3295


Published: 2018-10-16   Modified: 2018-10-17

Description:
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).

Type:

CWE-284

(Improper Access Control)

Vendor: Oracle
Product: Vm virtualbox 
Version:
5.1.8
5.1.6
5.1.4
5.1.2
5.1.18
5.1.14
5.1.10
5.1.0
5.0.36
5.0.32
5.0.26
5.0.24
5.0.20
5.0.18
5.0.16
5.0.14
5.0.13
5.0.12
5.0.10
4.3.8
4.3.6
4.3.4
4.3.36
4.3.35
4.3.34
4.3.29
4.3.2
4.3.18
4.3.14
4.3.12
4.3.10
4.3.0
4.2.8
4.2.6
4.2.4
4.2.36
4.2.34
4.2.31
4.2.26
4.2.24
4.2.22
4.2.20
4.2.2
4.2.18
4.2.16
4.2.14
4.2.12
4.2.10
4.2.0
4.1.8
4.1.6
4.1.44
4.1.42
4.1.4
4.1.39
4.1.34
4.1.32
4.1.30
4.1.28
4.1.26
4.1.24
4.1.22
4.1.20
4.1.2
4.1.18
4.1.16
4.1.14
4.1.12
4.1.10
4.1.0
4.0.8
4.0.6
4.0.4
4.0.36
4.0.34
4.0.31
4.0.26
4.0.24
4.0.22
4.0.20
4.0.2
4.0.18
4.0.16
4.0.14
4.0.12
4.0.10
4.0.0
4.0
3.2.8
3.2.6
3.2.4
3.2.24
3.2.22
3.2.20
3.2.2
3.2.18
3.2.16
3.2.14
3.2.12
3.2.10
See more versions on NVD

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.4/10
6.4/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105619
http://www.securitytracker.com/id/1041887

Related CVE
CVE-2018-3302
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network...
CVE-2018-3301
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology). Supported versions that are affected are 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attack...
CVE-2018-3299
Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocol...
CVE-2018-3298
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru...
CVE-2018-3297
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru...
CVE-2018-3296
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru...
CVE-2018-3294
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP...
CVE-2018-3293
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru...

Copyright 2018, cxsecurity.com

 

Back to Top