CVE-2017-3316
Published: 27 January 2017
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Confidentiality, Integrity and Availability impacts).
Notes
Author | Note |
---|---|
sbeattie | requires user interaction |
Priority
Status
Package | Release | Status |
---|---|---|
virtualbox Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(5.1.14-dfsg-1)
|
bionic |
Not vulnerable
(5.1.14-dfsg-1)
|
|
cosmic |
Not vulnerable
(5.1.14-dfsg-1)
|
|
disco |
Not vulnerable
(5.1.14-dfsg-1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(5.1.14-dfsg-1)
|
|
xenial |
Not vulnerable
(5.1.38-dfsg-0ubuntu1.16.04.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(5.1.14-dfsg-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |