Language:
https://bugzilla.suse.com/show_bug.cgi?id=1003077
https://bugzilla.suse.com/show_bug.cgi?id=1015703
https://bugzilla.suse.com/show_bug.cgi?id=1021256
https://bugzilla.suse.com/show_bug.cgi?id=1021762
https://bugzilla.suse.com/show_bug.cgi?id=1023377
https://bugzilla.suse.com/show_bug.cgi?id=1023762
https://bugzilla.suse.com/show_bug.cgi?id=1023992
https://bugzilla.suse.com/show_bug.cgi?id=1024938
https://bugzilla.suse.com/show_bug.cgi?id=1025235
https://bugzilla.suse.com/show_bug.cgi?id=1026024
https://bugzilla.suse.com/show_bug.cgi?id=1026722
https://bugzilla.suse.com/show_bug.cgi?id=1026914
https://bugzilla.suse.com/show_bug.cgi?id=1027066
https://bugzilla.suse.com/show_bug.cgi?id=1027149
https://bugzilla.suse.com/show_bug.cgi?id=1027178
https://bugzilla.suse.com/show_bug.cgi?id=1027189
https://bugzilla.suse.com/show_bug.cgi?id=1027190
https://bugzilla.suse.com/show_bug.cgi?id=1028415
https://bugzilla.suse.com/show_bug.cgi?id=1028895
https://bugzilla.suse.com/show_bug.cgi?id=1029986
https://bugzilla.suse.com/show_bug.cgi?id=1030118
https://bugzilla.suse.com/show_bug.cgi?id=1030213
https://bugzilla.suse.com/show_bug.cgi?id=1030901
https://bugzilla.suse.com/show_bug.cgi?id=1031003
https://bugzilla.suse.com/show_bug.cgi?id=1031052
https://bugzilla.suse.com/show_bug.cgi?id=1031440
https://bugzilla.suse.com/show_bug.cgi?id=1031579
https://bugzilla.suse.com/show_bug.cgi?id=1032344
https://bugzilla.suse.com/show_bug.cgi?id=1033336
https://bugzilla.suse.com/show_bug.cgi?id=914939
https://bugzilla.suse.com/show_bug.cgi?id=954763
https://bugzilla.suse.com/show_bug.cgi?id=968697
https://bugzilla.suse.com/show_bug.cgi?id=979215
https://bugzilla.suse.com/show_bug.cgi?id=983212
https://bugzilla.suse.com/show_bug.cgi?id=989056
https://www.suse.com/security/cve/CVE-2015-1350/
https://www.suse.com/security/cve/CVE-2016-10044/
https://www.suse.com/security/cve/CVE-2016-10200/
https://www.suse.com/security/cve/CVE-2016-10208/
https://www.suse.com/security/cve/CVE-2016-2117/
https://www.suse.com/security/cve/CVE-2016-3070/
https://www.suse.com/security/cve/CVE-2016-5243/
https://www.suse.com/security/cve/CVE-2016-7117/
https://www.suse.com/security/cve/CVE-2016-9588/
https://www.suse.com/security/cve/CVE-2017-2671/
https://www.suse.com/security/cve/CVE-2017-5669/
https://www.suse.com/security/cve/CVE-2017-5897/
https://www.suse.com/security/cve/CVE-2017-5970/
https://www.suse.com/security/cve/CVE-2017-5986/
https://www.suse.com/security/cve/CVE-2017-6074/
https://www.suse.com/security/cve/CVE-2017-6214/
https://www.suse.com/security/cve/CVE-2017-6345/
https://www.suse.com/security/cve/CVE-2017-6346/
https://www.suse.com/security/cve/CVE-2017-6348/
https://www.suse.com/security/cve/CVE-2017-6353/
https://www.suse.com/security/cve/CVE-2017-7187/
https://www.suse.com/security/cve/CVE-2017-7261/
https://www.suse.com/security/cve/CVE-2017-7294/
https://www.suse.com/security/cve/CVE-2017-7308/
深刻度: Critical
ID: 100150
ファイル名: suse_SU-2017-1247-1.nasl
バージョン: 3.10
タイプ: local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2017/5/12
更新日: 2021/1/6
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
リスクファクター: Critical
スコア: 9.6
リスクファクター: Critical
基本値: 10
現状値: 8.7
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
リスクファクター: Critical
基本値: 9.8
現状値: 9.4
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo, p-cpe:/a:novell:suse_linux:kernel-xen-debugsource, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_72-default, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_72-xen, cpe:/o:novell:suse_linux:12
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2017/5/11
脆弱性公開日: 2016/5/2
Core Impact
Metasploit (AF_PACKET packet_set_ring Privilege Escalation)
CVE: CVE-2015-1350, CVE-2016-10044, CVE-2016-10200, CVE-2016-10208, CVE-2016-2117, CVE-2016-3070, CVE-2016-5243, CVE-2016-7117, CVE-2016-9588, CVE-2017-2671, CVE-2017-5669, CVE-2017-5897, CVE-2017-5970, CVE-2017-5986, CVE-2017-6074, CVE-2017-6214, CVE-2017-6345, CVE-2017-6346, CVE-2017-6348, CVE-2017-6353, CVE-2017-7187, CVE-2017-7261, CVE-2017-7294, CVE-2017-7308, CVE-2017-7616