CVE-2016-5545
Published: 27 January 2017
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
Notes
Author | Note |
---|---|
sbeattie | requires user interaction |
Priority
Status
Package | Release | Status |
---|---|---|
virtualbox Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(5.1.14-dfsg-1)
|
bionic |
Not vulnerable
(5.1.14-dfsg-1)
|
|
cosmic |
Not vulnerable
(5.1.14-dfsg-1)
|
|
disco |
Not vulnerable
(5.1.14-dfsg-1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(5.1.14-dfsg-1)
|
|
xenial |
Not vulnerable
(5.1.14-dfsg-1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(5.1.14-dfsg-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |