CVE编号
CVE-2019-2524利用情况
暂无补丁情况
官方补丁披露时间
2019-01-17漏洞描述
Oracle Virtualization(子组件:Core)的Oracle VM VirtualBox组件中的漏洞。受影响的受支持版本在5.2.24之前和6.0.2之前。易于利用的漏洞允许低权限攻击者登录到Oracle VM VirtualBox执行的基础架构,以破坏Oracle VM VirtualBox。虽然该漏洞存在于Oracle VM VirtualBox中,但攻击可能会对其他产品产生重大影响。此漏洞的成功攻击可能导致Oracle VM VirtualBox的接管。 CVSS 3.0基本分数8.8(机密性,完整性和可用性影响)。 CVSS载体:(CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)。解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html | |
http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | |
http://www.securityfocus.com/bid/106568 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | oracle | vm_virtualbox | * |
Up to (excluding) 5.2.24 |
|||||
运行在以下环境 | |||||||||
应用 | oracle | vm_virtualbox | 6.0.0 | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | python-virtualbox | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-devel | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-guest-desktop-icons | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-guest-kmp-default | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-guest-source | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-guest-tools | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-guest-x11 | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-host-kmp-default | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-host-source | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-qt | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-vnc | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | virtualbox-websrv | * |
Up to (excluding) 5.2.24-lp150.4.33.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | python-virtualbox | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-devel | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-guest-desktop-icons | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-guest-kmp-default | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-guest-source | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-guest-tools | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-guest-x11 | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-host-kmp-default | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-host-source | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-qt | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-vnc | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | virtualbox-websrv | * |
Up to (excluding) 5.2.24-66.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | virtualbox | * |
Up to (excluding) 6.1.16-dfsg-6~ubuntu1.20.04.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...