CVE-2018-3294
Published: 17 October 2018
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
Priority
Status
Package | Release | Status |
---|---|---|
virtualbox Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(6.0.6-dfsg-1)
|
|
eoan |
Not vulnerable
(6.0.8-dfsg-7)
|
|
focal |
Not vulnerable
(6.0.8-dfsg-7)
|
|
groovy |
Not vulnerable
(6.0.8-dfsg-7)
|
|
hirsute |
Not vulnerable
(6.0.8-dfsg-7)
|
|
impish |
Not vulnerable
(6.0.8-dfsg-7)
|
|
jammy |
Not vulnerable
(6.0.8-dfsg-7)
|
|
kinetic |
Not vulnerable
(6.0.8-dfsg-7)
|
|
lunar |
Not vulnerable
(6.0.8-dfsg-7)
|
|
mantic |
Not vulnerable
(6.0.8-dfsg-7)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(5.2.20-dfsg-1)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.0 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H |