CVE-2017-10235
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.7 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H).
Vulnerabilidad en el componente Oracle VM VirtualBox de Oracle Virtualization (subcomponente: Core). La versión compatible afectada es anterior a la 5.1.24. Una vulnerabilidad fácilmente explotable permite que un atacante con un alto nivel de privilegios y con permisos de inicio de sesión en la infraestructura en la que se ejecuta Oracle VM VirtualBox comprometa la seguridad de Oracle VM VirtualBox. Aunque la vulnerabilidad está presente en Oracle VM VirtualBox, los ataques podrían afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden dar lugar a que el atacante consiga provocar el bloqueo o cierre repetido (DoS completo) de Oracle VM VirtualBox, así como la actualización, inserción o supresión sin autorización de algunos de los datos accesibles de Oracle VM VirtualBox. CVSS 3.0 Base Score 6.7 (impactos en la integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H).
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2017-06-21 CVE Reserved
- 2017-08-08 CVE Published
- 2024-08-13 EPSS Updated
- 2024-10-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99705 | Third Party Advisory | |
http://www.securitytracker.com/id/1038929 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | 2019-10-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Vm Virtualbox Search vendor "Oracle" for product "Vm Virtualbox" | <= 5.1.22 Search vendor "Oracle" for product "Vm Virtualbox" and version " <= 5.1.22" | - |
Affected
|