ID CVE-2018-2693
Summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Guest Additions). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
References
Vulnerable Configurations
  • Oracle VM VirtualBox 5.1.0
    cpe:2.3:a:oracle:vm_virtualbox:5.1.0
  • Oracle VM VirtualBox 5.1.2
    cpe:2.3:a:oracle:vm_virtualbox:5.1.2
  • Oracle VM VirtualBox 5.1.4
    cpe:2.3:a:oracle:vm_virtualbox:5.1.4
  • Oracle VM VirtualBox 5.1.6
    cpe:2.3:a:oracle:vm_virtualbox:5.1.6
  • Oracle VM VirtualBox 5.1.7
    cpe:2.3:a:oracle:vm_virtualbox:5.1.7
  • Oracle VM VirtualBox 5.1.8
    cpe:2.3:a:oracle:vm_virtualbox:5.1.8
  • Oracle VM VirtualBox 5.1.10
    cpe:2.3:a:oracle:vm_virtualbox:5.1.10
  • Oracle VM VirtualBox 5.1.12
    cpe:2.3:a:oracle:vm_virtualbox:5.1.12
  • Oracle VM VirtualBox 5.1.14
    cpe:2.3:a:oracle:vm_virtualbox:5.1.14
  • Oracle VM VirtualBox 5.1.16
    cpe:2.3:a:oracle:vm_virtualbox:5.1.16
  • Oracle VM VirtualBox 5.1.18
    cpe:2.3:a:oracle:vm_virtualbox:5.1.18
  • Oracle VM VirtualBox 5.1.20
    cpe:2.3:a:oracle:vm_virtualbox:5.1.20
  • Oracle VM VirtualBox 5.1.22
    cpe:2.3:a:oracle:vm_virtualbox:5.1.22
  • Oracle VM VirtualBox 5.1.24
    cpe:2.3:a:oracle:vm_virtualbox:5.1.24
  • Oracle VM VirtualBox 5.1.26
    cpe:2.3:a:oracle:vm_virtualbox:5.1.26
  • Oracle VM VirtualBox 5.1.28
    cpe:2.3:a:oracle:vm_virtualbox:5.1.28
  • Oracle VM VirtualBox 5.1.30
    cpe:2.3:a:oracle:vm_virtualbox:5.1.30
  • Oracle VM VirtualBox 5.2.0
    cpe:2.3:a:oracle:vm_virtualbox:5.2.0
  • Oracle VM VirtualBox 5.2.2
    cpe:2.3:a:oracle:vm_virtualbox:5.2.2
  • Oracle VM VirtualBox 5.2.4
    cpe:2.3:a:oracle:vm_virtualbox:5.2.4
CVSS
Base: 4.1
Impact:
Exploitability:
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-938.NASL
    description This update for kbuild, virtualbox fixes the following issues : kbuild changes : - Update to version 0.1.9998svn3110 - Do not assume glibc glob internals - Support GLIBC glob interface version 2 - Fix build failure (boo#1079838) - Fix build with GCC7 (boo#1039375) - Fix build by disabling vboxvideo_drv.so virtualbox security fixes (boo#1101667, boo#1076372) : - CVE-2018-3005 - CVE-2018-3055 - CVE-2018-3085 - CVE-2018-3086 - CVE-2018-3087 - CVE-2018-3088 - CVE-2018-3089 - CVE-2018-3090 - CVE-2018-3091 - CVE-2018-2694 - CVE-2018-2698 - CVE-2018-2685 - CVE-2018-2686 - CVE-2018-2687 - CVE-2018-2688 - CVE-2018-2689 - CVE-2018-2690 - CVE-2018-2676 - CVE-2018-2693 - CVE-2017-5715 virtualbox other changes : - Version bump to 5.2.16 - Use %{?linux_make_arch} when building kernel modules (boo#1098050) - Fixed vboxguestconfig.sh script - Update warning regarding the security hole in USB passthrough. (boo#1097248) - Fixed include for build with Qt 5.11 (boo#1093731) - You can find a detailed list of changes [here](https://www.virtualbox.org/wiki/Changelog#v16)
    last seen 2019-02-21
    modified 2018-08-27
    plugin id 112143
    published 2018-08-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112143
    title openSUSE Security Update : kbuild / virtualbox (openSUSE-2018-938) (Spectre)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201802-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201802-01 (VirtualBox: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details. Impact : An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 106739
    published 2018-02-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106739
    title GLSA-201802-01 : VirtualBox: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-75.NASL
    description This update for virtualbox to version 5.1.32 fixes the following issues : The following vulnerabilities were fixed (boo#1076372) : - CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, also known as 'Spectre', bsc#1068032. - CVE-2018-2676: Local authenticated attacker may gain elevated privileges - CVE-2018-2685: Local authenticated attacker may gain elevated privileges - CVE-2018-2686: Local authenticated attacker may gain elevated privileges - CVE-2018-2687: Local authenticated attacker may gain elevated privileges - CVE-2018-2688: Local authenticated attacker may gain elevated privileges - CVE-2018-2689: Local authenticated attacker may gain elevated privileges - CVE-2018-2690: Local authenticated attacker may gain elevated privileges - CVE-2018-2693: Local authenticated attacker may gain elevated privileges via guest additions - CVE-2018-2694: Local authenticated attacker may gain elevated privileges - CVE-2018-2698: Local authenticated attacker may gain elevated privileges The following bug fixes are included : - fix occasional screen corruption when host screen resolution is changed - increase proposed disk size when creating new VMs for Windows 7 and newer - fix broken communication with certain devices on Linux hosts - Fix problems using 256MB VRAM in raw-mode VMs - add HDA support for more exotic guests (e.g. Haiku) - fix playback with ALSA backend (5.1.28 regression) - fix a problem where OHCI emulation might sporadically drop data transfers
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 106289
    published 2018-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106289
    title openSUSE Security Update : virtualbox (openSUSE-2018-75) (Spectre)
refmap via4
bid 102702
confirm http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
sectrack 1040202
Last major update 17-01-2018 - 21:29
Published 17-01-2018 - 21:29
Last modified 02-10-2019 - 20:03
Back to Top