CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). Note: This vulnerability applies to Solaris x86 and Linux systems only. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. In most cases, weve done a minimal setup, to let you alter the images to your own needs and learn how to use the operating systems. The supported version that is affected is Prior to 6.1.24. Welcome This project provides virtual machines for Oracle VM VirtualBox® for several free and/or open-source operating systems, such as GNU/Linux or Free/Net/OpenBSD for testing, security and/or entertainment purposes. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |