vuln-list-alt/oval/p11/ALT-PU-2018-2533/definitions.json
2024-12-12 21:07:30 +00:00

491 lines
30 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182533",
"Version": "oval:org.altlinux.errata:def:20182533",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2533: package `virtualbox` update to version 5.2.20-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2533",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2533",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00096",
"RefURL": "https://bdu.fstec.ru/vul/2019-00096",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00098",
"RefURL": "https://bdu.fstec.ru/vul/2019-00098",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00099",
"RefURL": "https://bdu.fstec.ru/vul/2019-00099",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00100",
"RefURL": "https://bdu.fstec.ru/vul/2019-00100",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00101",
"RefURL": "https://bdu.fstec.ru/vul/2019-00101",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00102",
"RefURL": "https://bdu.fstec.ru/vul/2019-00102",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00263",
"RefURL": "https://bdu.fstec.ru/vul/2019-00263",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00264",
"RefURL": "https://bdu.fstec.ru/vul/2019-00264",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00265",
"RefURL": "https://bdu.fstec.ru/vul/2019-00265",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00266",
"RefURL": "https://bdu.fstec.ru/vul/2019-00266",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00267",
"RefURL": "https://bdu.fstec.ru/vul/2019-00267",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00268",
"RefURL": "https://bdu.fstec.ru/vul/2019-00268",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00269",
"RefURL": "https://bdu.fstec.ru/vul/2019-00269",
"Source": "BDU"
},
{
"RefID": "CVE-2018-2909",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-2909",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3287",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3287",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3288",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3288",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3289",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3289",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3290",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3290",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3291",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3291",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3292",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3292",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3293",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3293",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3294",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3294",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3295",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3295",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3296",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3296",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3297",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3297",
"Source": "CVE"
},
{
"RefID": "CVE-2018-3298",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-3298",
"Source": "CVE"
}
],
"Description": "This update upgrades virtualbox to version 5.2.20-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00096: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным\n\n * BDU:2019-00098: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным\n\n * BDU:2019-00099: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным\n\n * BDU:2019-00100: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-00101: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-00102: Уязвимость подкомпонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-00263: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00264: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00265: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00266: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00267: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00268: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2019-00269: Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю получить полный контроль над приложением\n\n * CVE-2018-2909: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3287: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3288: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3289: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3290: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3291: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3292: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3293: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3294: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3295: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3296: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3297: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\n\n * CVE-2018-3298: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-10-22"
},
"Updated": {
"Date": "2018-10-22"
},
"BDUs": [
{
"ID": "BDU:2019-00096",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00096",
"Impact": "Critical",
"Public": "20181016"
},
{
"ID": "BDU:2019-00098",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00098",
"Impact": "High",
"Public": "20181016"
},
{
"ID": "BDU:2019-00099",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00099",
"Impact": "High",
"Public": "20181016"
},
{
"ID": "BDU:2019-00100",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00100",
"Impact": "High",
"Public": "20181016"
},
{
"ID": "BDU:2019-00101",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00101",
"Impact": "High",
"Public": "20181016"
},
{
"ID": "BDU:2019-00102",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00102",
"Impact": "High",
"Public": "20181016"
},
{
"ID": "BDU:2019-00263",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00263",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00264",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00264",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00265",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00265",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00266",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00266",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00267",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00267",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00268",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00268",
"Impact": "High",
"Public": "20190115"
},
{
"ID": "BDU:2019-00269",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-00269",
"Impact": "High",
"Public": "20190115"
}
],
"CVEs": [
{
"ID": "CVE-2018-2909",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-2909",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3287",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3287",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3288",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3288",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3289",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3289",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3290",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3290",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3291",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3291",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3292",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3292",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3293",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3293",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3294",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3294",
"Impact": "Critical",
"Public": "20181017"
},
{
"ID": "CVE-2018-3295",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3295",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3296",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3296",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3297",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3297",
"Impact": "High",
"Public": "20181017"
},
{
"ID": "CVE-2018-3298",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-3298",
"Impact": "High",
"Public": "20181017"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182533001",
"Comment": "kernel-source-vboxdrv is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533002",
"Comment": "kernel-source-vboxguest is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533003",
"Comment": "kernel-source-vboxnetadp is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533004",
"Comment": "kernel-source-vboxnetflt is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533005",
"Comment": "kernel-source-vboxpci is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533006",
"Comment": "kernel-source-vboxsf is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533007",
"Comment": "kernel-source-vboxvideo is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533008",
"Comment": "python-module-vboxapi is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533009",
"Comment": "virtualbox is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533010",
"Comment": "virtualbox-common is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533011",
"Comment": "virtualbox-guest-additions is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533012",
"Comment": "virtualbox-guest-utils is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533013",
"Comment": "virtualbox-sdk is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533014",
"Comment": "virtualbox-sdk-xpcom is earlier than 0:5.2.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182533015",
"Comment": "virtualbox-webservice is earlier than 0:5.2.20-alt1"
}
]
}
]
}
}
]
}